[tor-bugs] #11207 [Tor]: Sybil selection should be trickier to game

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Mar 15 01:56:25 UTC 2014


#11207: Sybil selection should be trickier to game
-------------------------------------+------------------------------------
 Reporter:  nickm                    |          Owner:
     Type:  enhancement              |         Status:  new
 Priority:  major                    |      Milestone:  Tor: 0.2.6.x-final
Component:  Tor                      |        Version:
 Keywords:  tor-auth needs-proposal  |  Actual Points:
Parent ID:                           |         Points:
-------------------------------------+------------------------------------
 In response to some of the hidden service attack papers from 2013, we made
 it harder to use sybil-based tricks to move around the HSDir hash ring.
 But really, we should come up with a better way to shut down sybil-based
 tricks in general, in case there are more that we don't know about.

 One place to start would be with the question: how often does the sybil
 code actually get invoked for legit nodes not run by security researchers?
 If the answer is "infrequently" , then perhaps we could move to an even
 simpler, blunter approach of "Call all nodes on an IP down for as long as
 there are too many verified-connectable nodes on that IP."

 Or we might take another approach to selecting which nodes to list. #8710
 isn't right, but perhaps something else might be.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11207>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list