[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #15938 [Tor]: HS descriptor cache leaks timing information to local users



#15938: HS descriptor cache leaks timing information to local users
--------------------------------+------------------------------
 Reporter:  teor                |          Owner:
     Type:  defect              |         Status:  new
 Priority:  normal              |      Milestone:  Tor: 0.2.???
Component:  Tor                 |        Version:
 Keywords:  SponsorR, SponsorU  |  Actual Points:
Parent ID:                      |         Points:
--------------------------------+------------------------------
 Anyone who can connect to a tor client can discover which HSs have been
 accessed recently, by running a timing attack against the HS cache. Cached
 descriptors return much faster than uncached descriptors.

 This may be possible through browser JavaScript attempting HS connections
 and timing the responses.

 An observer on the network or in control of an HSDir could potentially
 enhance this timing attack with network request correlation.

 Yawning suggests a per-stream-isolation cache to avoid this issue.

 Each TorBrowser-isolated cache would most likely have 0 or 1 HS descriptor
 in it - 0 if the URL is not a HS, and 1 if it is.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15938>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs