[tor-relays] TOR router install without access to root

pa011 pa011 at web.de
Wed May 25 20:41:22 UTC 2016


@Green
Thank you - couldn’t handle 'attack vector' as a synonym for ""method or
type of attack" :-)

Additional to that is it clever for a supporter of TOR to to run more
than one Relay (Exit) with a single ISP or even AS
https://en.wikipedia.org/wiki/Autonomous_system_(Internet) or does this
build a kind of new attack vector?



Am 25.05.2016 um 22:22 schrieb Green Dream:
> @Paul: sure. Nils pointed out that a lot of relays using the same
> hosting provider could be an attack vector, because the provider would
> be a single point where all the relays' secret keys could be collected.
> My point is that if you look at the AS (Autonomous System) Number, it's
> normally the same for all the hosting provider's servers in that
> country. So if Tor path selection looks at the AS, and avoids building a
> circuit that uses two nodes from the same AS, this attack vector
> basically goes away. It's worth noting if you weren't already aware,
> both Atlas and Globe display the AS Number for every relay.
> 
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> 


More information about the tor-relays mailing list