[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5460 [Tor Client]: Write proposal(s) to evaluate circuit crypto authentication



#5460: Write proposal(s) to evaluate circuit crypto authentication
------------------------+---------------------------------------------------
 Reporter:  mikeperry   |          Owner:  nickm             
     Type:  defect      |         Status:  assigned          
 Priority:  major       |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Client  |        Version:                    
 Keywords:              |         Parent:  #5456             
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by arma):

 Replying to [comment:4 mikeperry]:
 > Ondrej pointed out that I2P's one-RTT circuit construction is very
 useful for avoiding disclosing the length of your circuit. It might also
 be useful for avoiding the per-hop MACs we'd need here.

 There are a series of papers on one-RTT circuit construction for Tor. See
 e.g. http://freehaven.net/anonbib/#sphinx-onion-fc10

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5460#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs