[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock



#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+-----------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  new
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+-----------------

Comment (by nickm_mobile):

 Hmm. So, this issue wouldn't work the same way as the ssl clienthello
 issue would work. WIth clienthello, the timestamp was sent both locally in
 non-anonymized tls and remotely in anonymized tls.  Here, the timestamp is
 sent locally, but not remotely, since tor doesn't relay tls headers.

 Now, there could still be an issue : if tcp (or some other protocol) leaks
 the client's view of the current time to the local network, and some other
 protocol leaks the client's view of the time remotely.

 Generally, the answer we've mostly gone with in cases like that is to
 attend mostly to the anonhmized protocol. There's generally more work to
 do there anyway. But if there's an easy fix to better  hide more time info
 in tcp, I'd be in favor.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs