[tor-bugs] #22791 [Core Tor/Tor]: Prop 224 encrypted public key

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jul 3 13:07:19 UTC 2017


#22791: Prop 224 encrypted public key
---------------------------+------------------------------------
 Reporter:  Dbryrtfbcbhgf  |          Owner:
     Type:  defect         |         Status:  closed
 Priority:  High           |      Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor   |        Version:
 Severity:  Normal         |     Resolution:  invalid
 Keywords:                 |  Actual Points:
Parent ID:                 |         Points:
 Reviewer:                 |        Sponsor:
---------------------------+------------------------------------
Changes (by dgoulet):

 * status:  new => closed
 * resolution:   => invalid


Comment:

 There seems to be many confusion here.

 The `HS-DESC-FIRST-LAYER` is not encrypted differently per client. If you
 don't know the onion address, you can't log the ciphertext _from_ the
 descriptor because you can't get it in the first place without the onion
 address. So the attackers move here is to run a bunch of HSDir and log all
 ciphertext it sees. But because that ciphertext is always the same, I
 don't see how you would correlate this with the number of clients
 visiting...? You can do that by counting the number of descriptor request
 you get for that descriptor and extrapolating by 3 (because 3 directories
 by default).

 Furthermore, that layer *IS* padded but it is ultimately to hide if a
 onion address is using client authorization and the number of introduction
 points. See section 2.5.1.1.:

 {{{
    Before encryption the plaintext is padded with NUL bytes to the nearest
    multiple of 10k bytes.
 }}}

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/22791#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list