[tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jul 27 09:46:05 UTC 2015


#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+--------------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  closed
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:  not a bug             |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+--------------------

Comment (by mikeperry):

 An extra question here is if it is possible to reconstruct even these 32
 bits of time value than remain from the ISN, which would potentially
 assist correlation even without the full clock.

 I don't think that is possible either, because net_secret is 128 bits and
 the connection tuple should make replays rare, but the use of MD5 is
 concerning here. If this were possible, it also seems like that should
 reduce to ISN prediction, as well, though.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list