[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7277 [Tor]: timestamp leaked in TLS client hello



#7277: timestamp leaked in TLS client hello
------------------------+---------------------------------------------------
 Reporter:  proper      |          Owner:                    
     Type:  defect      |         Status:  new               
 Priority:  normal      |      Milestone:  Tor: 0.2.5.x-final
Component:  Tor         |        Version:                    
 Keywords:  tor-client  |         Parent:                    
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by nickm):

 Replying to [comment:9 arma]:
 > Hey, isn't the timestamp in the clienthello (and serverhello), and thus
 visible to external observers too?

 That's what we're talking about here, I believe.

 > So a) a passive adversary of the client can do this tracking too, not
 just the guard

 Yes.

 > and b) if we stop putting (something similar to) the time there, we have
 introduced an "is it tor tls or other tls" identifier.

 Yes. The only way to avoid having a fingerprint while at the same time
 avoiding skew-based tracking would to ensure that all Tor client clocks
 are synchonized with high accuracy.  The next-best thing would be to round
 off with high granularity, but I'm not sure that's actually a win.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7277#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs