evil nodes

Chris Palmer chris at eff.org
Fri Jun 3 16:43:06 UTC 2005


Chris Palmer writes:

> If an adversary alters the ciphertext of an encrypted cell of Tor
> traffic, the cell will fail the integrity check done by each Tor node
> in your circuit, and the cell will have to be resent.

Peter notes that instead of re-sending the cell, Tor will tear-down the
circuit.

Either way, an adversary that is not an exit node cannot get away with
altering your traffic.


-- 
http://www.eff.org/about/staff/#chris_palmer

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050603/7f262c87/attachment.pgp>


More information about the tor-talk mailing list