[tor-bugs] #17254 [Tor]: Scalable HSes by splitting intro/rendezvous

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 14 14:27:29 UTC 2015


#17254: Scalable HSes by splitting intro/rendezvous
-------------------------+------------------------------------
 Reporter:  TvdW         |          Owner:
     Type:  enhancement  |         Status:  needs_revision
 Priority:  Medium       |      Milestone:  Tor: 0.2.8.x-final
Component:  Tor          |        Version:
 Severity:  Normal       |     Resolution:
 Keywords:  tor-hs       |  Actual Points:
Parent ID:               |         Points:  medium
  Sponsor:  SponsorR     |
-------------------------+------------------------------------

Comment (by teor):

 Replying to [comment:8 nickm]:
 > Comments on the spec branch:
 >    * I really don't like sending private keys around like this.  Is
 there any way to avoid it?

 I discussed an alternative design with TvdW, where the introduction side
 decrypts the blob using the introduction key, then hands off the decrypted
 fields to the rendezvous side. This avoids sending the key, so if the
 decrypted fields are exposed, only that rendezvous is affected. The
 tradeoff is increased decryption load on the introduction side.

 I think this change is worth it for the security improvement.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17254#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list