[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #19923 [Core Tor/Tor]: Single Onion Services should upgrade to ntor (if they can)



#19923: Single Onion Services should upgrade to ntor (if they can)
-------------------------+-------------------------------------------------
     Reporter:  teor     |      Owner:
         Type:           |     Status:  new
  enhancement            |
     Priority:  Medium   |  Milestone:
    Component:  Core     |    Version:
  Tor/Tor                |   Keywords:  029-proposed, sos, rsos, tor-hs,
     Severity:  Normal   |  TorCoreTeam201608
Actual Points:           |  Parent ID:
       Points:  1.0      |   Reviewer:
      Sponsor:           |
-------------------------+-------------------------------------------------
 Split off #17178 and #19163, depends on both.

 Single Onion Services build a one-hop path to the client-provided
 rendezvous point. This circuit is only secured using SSL and TAP, as the
 INTRODUCE cell only contains TAP onion keys.

 But in most cases, the Single Onion Service can look up the ntor onion key
 for the rendezvous point in the consensus, and therefore it can upgrade to
 ntor. (If it doesn't find the rendezvous point in the consensus, it simply
 continues with TAP.)

 My suggested solution is to replace the entire rendezvous point
 extend_info with the extend_info from the consensus (if found). We should
 do this for both clients and services, whether using Single Onion Services
 or Tor2web or not (to avoid introducing new fingerprinting mechanisms).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19923>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs