[tor-talk] Theft of Tor relay private keys?

Mike Perry mikeperry at torproject.org
Wed Jul 3 06:01:15 UTC 2013


Andreas Krey:
> On Tue, 02 Jul 2013 12:33:10 +0000, Mike Perry wrote:
> ...
> > But I got distracted by more pressing issues before I could finish the
> > scripts.. Also, many of those encrypted+authenticated Tor container
> > things probably don't make much sense without Secure Boot to
> > authenticate the boot process up until you can start up Tor. :/
> 
> What's the difference between subverting that and
> the NSA starting their own tor nodes in the first place?

What do you mean by 'that'?

Guard node key theft allows a form of route capture where your upstream
gets to direct your traffic to the exit nodes of their choice, using
either cryptographic tagging/bitstomping or a timing-based version,
*without* actually running the Guard nodes you use.

In 0.2.4.x, I did a lot of work on the "path bias" detectors so that
your Tor client could at least alert you in these situations.  However,
I think we need a combination of #5968 (which I mentioned in my first
reply) and https://trac.torproject.org/projects/tor/ticket/5460 to make
these attacks significantly less feasible in the first place.

Now, the NSA (or any other upstream) could force you to only use Guards
they control to perform the attack without key theft. For that, we need
https://trac.torproject.org/projects/tor/ticket/5462

However, I think that even in that case, a proper implementation of
#5460 should still prevent them from being able to directly control your
circuits easily, especially in combination with the path bias detectors.



-- 
Mike Perry
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 163 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20130702/f5af6dcf/attachment.sig>


More information about the tor-talk mailing list