[tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Jul 27 09:46:05 UTC 2015
#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+--------------------
Reporter: source | Owner:
Type: defect | Status: closed
Priority: normal | Milestone:
Component: - Select a component | Version:
Resolution: not a bug | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+--------------------
Comment (by mikeperry):
An extra question here is if it is possible to reconstruct even these 32
bits of time value than remain from the ISN, which would potentially
assist correlation even without the full clock.
I don't think that is possible either, because net_secret is 128 bits and
the connection tuple should make replays rare, but the use of MD5 is
concerning here. If this were possible, it also seems like that should
reduce to ISN prediction, as well, though.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list