[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #28988 [Core Tor/Tor]: Bridge node wil be exposed by malicious middle nodes.



#28988: Bridge node wil be exposed by malicious middle nodes.
--------------------------+------------------------------------
 Reporter:  TBD.Chen      |          Owner:  (none)
     Type:  defect        |         Status:  closed
 Priority:  Medium        |      Milestone:
Component:  Core Tor/Tor  |        Version:  Tor: 0.3.5.3-alpha
 Severity:  Normal        |     Resolution:  duplicate
 Keywords:  Bridge        |  Actual Points:
Parent ID:  #7144         |         Points:
 Reviewer:                |        Sponsor:
--------------------------+------------------------------------

Comment (by TBD.Chen):

 > Expecting clients to keep a small number of middle nodes is not enough,
 because malicious clients won't do that.


 If the attacker is the Client, then before she connect to the bridge, she
 have already nown the IP address of the bridge, and she do not need to
 expose the bridge to the other middle node.
 However, if the attacker is the Middle node, then the innocent client keep
 a small number of middle nodes may effectively evade the malicous Middle
 node.

 This is based the assumption that the attacker only want to collect the IP
 of bridge , and she never want to help the other attacker.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28988#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs