[tor-bugs] #10221 [Tor]: Implement BGP malicious route checks before publishing descriptor in consensus
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Nov 25 16:02:49 UTC 2013
#10221: Implement BGP malicious route checks before publishing descriptor in
consensus
-----------------------------+--------------------------------
Reporter: anon | Owner:
Type: enhancement | Status: new
Priority: normal | Milestone: Tor: unspecified
Component: Tor | Version:
Resolution: | Keywords: BGP needs-proposal
Actual Points: | Parent ID:
Points: |
-----------------------------+--------------------------------
Changes (by nickm):
* keywords: BGP => BGP needs-proposal
* milestone: => Tor: unspecified
Comment:
Interesting. Is there an easy-to-use tool to check for route hijacking?
One worrisome thing here is that you'd need a way to keep this feature
from turning into a selective DoS tool. If any Tor node gets kicked out
of the consensus for having ''any'' (!) route to that node hijacked, then
we're effectively giving the adversary the ability to kick Tor nodes off
the network, potentially reshaping the network more to their likelihood.
Somebody needs to do the math to figure out whether this is somehow an
improvement or not.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10221#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list