[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7679 [Tor]: Test integration of Minion with Tor relays



#7679: Test integration of Minion with Tor relays
-----------------------+----------------------------------------------------
 Reporter:  arma       |          Owner:                  
     Type:  project    |         Status:  new             
 Priority:  normal     |      Milestone:  Tor: unspecified
Component:  Tor        |        Version:                  
 Keywords:  tor-relay  |         Parent:                  
   Points:             |   Actualpoints:                  
-----------------------+----------------------------------------------------
Changes (by nickm):

  * keywords:  => tor-relay


Comment:

 Interesting stuff!

 For what it's worth, Tor's still using openssl and isn't currently moving
 to NSS.

 The part I wonder about for us is that it's not actually trivial to handle
 Tor cells out-of-order: they aren't self-framing and the streams aren't
 self-synchronizing, so if I decrypt a TLS record out-of-order, I don't see
 how I can know whether that record's contents starts in the middle of a
 Tor cell or at the beginning, and so on.  Even if I know I'm getting a
 cell, I need to know how many intervening cells there have been on that
 circuit, or I won't know how to decrypt the cell.

 These aren't insurmountable obstacles, but they do suggest that we'd need
 to change the Tor link protocol in order to take advantage of Minion.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7679#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs