OSI 1-3 attack on Tor? in it.wikipedia

Jan Reister Jan.Reister at unimi.it
Thu Feb 14 07:57:25 UTC 2008


Il 13/02/2008 20:55, Marco Bonetti ha scritto:
> that's the whole point of encrypting the communications and sharing the
> public keys fingerprints inside tor sources.
> a man in the middle can reroute traffic through his nodes but it will be
> useless (except for sending your connections to /dev/null) as it can't
> fake the private keys of each node.

Exactly that. An attacker can set up rogue nodes, but this is part of 
the threat model.

Jan



More information about the tor-talk mailing list