[tor-bugs] #27816 [Core Tor/Tor]: Rendezvous failures could distinguish "unknown cookie" from "outdated cookie"

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Sep 24 12:26:21 UTC 2018


#27816: Rendezvous failures could distinguish "unknown cookie" from "outdated
cookie"
--------------------------+----------------------------------
 Reporter:  arma          |          Owner:  (none)
     Type:  defect        |         Status:  new
 Priority:  Medium        |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:  tor-hs        |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------
Changes (by dgoulet):

 * cc: dgoulet (removed)
 * keywords:   => tor-hs
 * milestone:   => Tor: unspecified


Comment:

 That would require a major refactoring of the rendezvous cookie cache. We
 use the `hs_circuitmap` subsystem meaning that we associate cookie ->
 circuit ... and thus if the circuit disappears, the cookie follows.

 Keeping that cookie alive after the circuit is closed would need us to
 have a separate cache where entries would be kept for N minutes. It is
 probably closer to 300 lines theory ;).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27816#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list