[tor-relays] 90% of exits vulnerable to TCP off-path attack

dawuud dawuud at riseup.net
Fri Aug 12 16:15:57 UTC 2016


Indeed! Perhaps we can extend the research paper's (the actual paper not that silly article)
4-tuple inference to infer tor connections for a given relay without knowledge of the connecting
relay's IP address by extending the permutation space using the current tor relay consensus.


On Fri, Aug 12, 2016 at 11:52:55AM -0400, starlight.2016q3 at binnacle.cx wrote:
> [one last time, no DKIM for Tor lists nevermore]
> 
> RFC-5961
> 
> CVE-2016-5696
> 
> http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_communications/
> 
> FYI all
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160812/6fde16ec/attachment.sig>


More information about the tor-relays mailing list