[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17239 [Tor]: Implement new key blinding scheme for proposal 224



#17239: Implement new key blinding scheme for proposal 224
-------------------------+------------------------------
 Reporter:  dgoulet      |          Owner:
     Type:  enhancement  |         Status:  new
 Priority:  Medium       |      Milestone:  Tor: 0.2.???
Component:  Tor          |        Version:
 Severity:  Normal       |     Resolution:
 Keywords:  tor-hs       |  Actual Points:
Parent ID:  #12424       |         Points:  large
  Sponsor:               |
-------------------------+------------------------------

Comment (by teor):

 We send the same blinded key to each HSDir, and use it to encrypt the
 payload.

 This allows the HSDir to descrypt the descriptor, which seems
 dangerous/unnecessary.
 It also allows a HSDir to work out which other HSDirs hold descriptors for
 the same hidden service.

 If we:
 * send different blinded keys to each replica (doing this for spread leaks
 information), and
 * use a different blinded key for retrieval and encryption,

 then the HSDir can't decrypt the descriptor or find the other descriptor
 replica.
 It can only find the other HSDirs in the spread for this descriptor's
 replica, which it can do using the hash ring anyway.

 See for extensive, over-the-top detail:
 https://lists.torproject.org/pipermail/tor-dev/2015-November/009884.html

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17239#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs