[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #11973 [Tor]: Should relays stop making unencrypted directory connections?



#11973: Should relays stop making unencrypted directory connections?
------------------------+------------------------------
     Reporter:  nickm   |      Owner:
         Type:  defect  |     Status:  new
     Priority:  normal  |  Milestone:  Tor: unspecified
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  needs-proposal
Actual Points:          |  Parent ID:
       Points:          |
------------------------+------------------------------

Comment (by bburley):

 I have a better understanding now of the reasoning behind using direct or
 encrypted sessions when communicating with the authorities. (1) Cost of
 server resources, and (2) protecting information believed to not need
 protecting.

 I don't know the value of (1), but I do believe that removing an
 additional way of someone determining you are operating as part of the Tor
 infrastructure in valuable. Yes, someone can enumerate the Tor
 infrastructure by installing a client. That is one way to get information
 if they are looking for who is running Tor nodes. Someone trying to figure
 out what a particular server is running, not looking for Tor specifically,
 is a different attack/angle. Not encrypting that info allows someone to
 determine a server is running Tor when they weren't looking for it in the
 first place, but now they know.

 Would it be reasonable have an option created to turn this capability
 on/off?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11973#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs