[tor-bugs] #20212 [Applications/Tor Browser]: Tor can be forced to open too many circuits by embedding .onion resources

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 25 02:38:23 UTC 2017


#20212: Tor can be forced to open too many circuits by embedding .onion resources
--------------------------------------+----------------------------------
 Reporter:  gacar                     |          Owner:  tbb-team
     Type:  enhancement               |         Status:  new
 Priority:  Medium                    |      Milestone:  Tor: unspecified
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:  guard-discovery           |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+----------------------------------
Changes (by mikeperry):

 * milestone:   => Tor: unspecified


Comment:

 Unlike the generic or custom-built Tor client case (CDNs and status
 pingers will likely customize their Tor client for performance), Tor
 Browser specifies a SOCKS username and password for url bar domain
 isolation. When this u+p is set, we should be able to safely limit the
 number of onion hostnames for a single SOCKS username + password to some
 low number (5? 10?).

 Do we need a separate limit if third party hidden services are malicious
 and deliberately fail either HSDIR, IP, or RP attempts in a way that
 causes the client to retry them? Maybe there should be a total rend
 circuit limit per SOCKS u+p?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20212#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list