[tor-bugs] #28295 [Core Tor/Nyx]: Non-interactive way to supply ControlPort password for nyx and tor-prompt is needed

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Nov 5 10:29:37 UTC 2018


#28295: Non-interactive way to supply ControlPort password for nyx and tor-prompt
is needed
--------------------------+------------------------------
 Reporter:  wagon         |          Owner:  atagar
     Type:  enhancement   |         Status:  assigned
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Nyx  |        Version:  Tor: 0.3.4.8
 Severity:  Normal        |     Resolution:
 Keywords:                |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------

Comment (by wagon):

 > From a technical standpoint I'm unsure it's useful, since a persisted
 config password is effectively cookie authentication. Said another way, in
 authentication schemes a password is 'something you know' whereas cookie
 auth is 'something you have'. If you write your password into a text file
 it's just a poor man's cookie authentication.
 I would say the opposite: cookie authentication is a poor man's password
 authentication.

 When you use cookie file (i.e. socket mechanism of communication between
 processes):

 1. You cannot use standard firewall tools to monitor access to this file
 and report all unauthenticated access attempts. You cannot later
 investigate possible incidents and get information: who (user), when
 (time), and why (malicious or not?) accessed Tor's `ControlPort`. Strictly
 speaking, it is still possible to monitor access with some non-standard
 sophisticated mechanisms, but I consider them to be more hard to learn and
 use (than firewall).
 2. By default (if you don't use ACL) you are restricted to standard UNIX
 mechanisms of access control for the cookie file. (For example, you cannot
 make a single file readable for one user group, but writable for another
 user group.) Though I cannot tell now some good example when this may be
 needed,  potentially it may happen.

 Thus, if you have a properly configured firewall, you get very powerful
 and flexible solution for both  the access control and the monitoring.

 However, despite you can configure such a firewall for your needs, there
 is no standard firewall tool for everybody which works out-of-the-box for
 most configurations. Without such firewall tool the password
 authentication doesn't give you more than cookie authentication. So, for
 layman Tor users, cookie authentication (now working in many systems) is a
 very simple but still sufficiently secure out-of-the-box solution. Using
 firewall and password authentication and can do the same and much more,
 but most of people either don't need it or don't have time and knowledge
 to configure it.

 > I'll be sure it's included in the next release
 Good news! Thank you!

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28295#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list