[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4570 [Tor Bridge]: Implement certificate serial number covert channel (part of proposal 179)



#4570: Implement certificate serial number covert channel (part of proposal 179)
------------------------+---------------------------------------------------
 Reporter:  asn         |          Owner:       
     Type:  defect      |         Status:  new  
 Priority:  normal      |      Milestone:       
Component:  Tor Bridge  |        Version:       
 Keywords:              |         Parent:  #3972
   Points:              |   Actualpoints:       
------------------------+---------------------------------------------------

Comment(by nickm):

 Replying to [comment:2 asn]:

 > We will always have false positives with this scheme, till all the
 non-0.2.3.x relays disappear from the network.

 Unless we use the other v3-indicating cert features plus the SN to
 indicate

 Let's take a step back -- do you currently think this feature is a good
 idea?  I don't think it's workable if we have user-provided certs, and I
 think that getting user-provided certs to work is more important than
 this.


 > > > For link protocol version negotiation, we have the VERSIONS cell. We
 might '''need''' a covert channel '''on''' the SSL handshake, if we need
 to negotiate the link protocol version before the Tor protocol. In which
 cases do we need such a '''visible''' covert channel?
 > >
 > > The question isn't whether we need a visible one; it's whether we'll
 ever need to do again what we've done with the v1->v2 and v2->v3 link
 protocol transition, where the client learns which handshake it is before
 the handshake is actually done, so that the client can act differently,
 depending.  I *think* that v3 should be flexible enough to last
 indefinitely, but we should actually figure this out.
 >
 > VERSIONS cells should be enough to negotiate future 'in-protocol' link
 protocols.
 >
 > A covert channel like the one described in 178 could find use:
 >
 > a) If we needed to do our link protocol in the initial SSL handshake.
 But we've grown old for that, no?

 Well, we did need to negotiate v1 vs v2 this way, and v2 vs v3 this way.
 We couldn't use VERSIONS cells, since these connection varieties differ in
 their TLS handshakes.

 > b) If we needed to negotiate the link protocol before the Tor protocol
 hits the wire. This sounds like an anti-bridge-detection measure, but I
 can't find any scenarios where such a '''visible''' covert channel would
 help [0].
 >
 > Can you describe a use case where VERSIONS wouldn't do it and this
 serialNumber covert channel would help?

 Yes; the case of how we negotiate v1 vs v2, and v2 vs v3 now.  If we need
 to do some other kind of TLS handshake, then the VERSIONS cell can't help
 us, since that happens after the TLS handshake.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4570#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs