[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock



#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+--------------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  closed
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:  not a bug             |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+--------------------

Comment (by mikeperry):

 FTR, I think is is worth complaining to the kernel developers for the
 simple reason that adding the 64ns timer post-hash probably *does* leak
 side channels about CPU activity, and that may prove very dangerous for
 long-running cryptographic operations (along the lines of the hot-or-not
 issue). Unfortunately, someone probably needs to produce more research
 papers before they will listen.

 As far as this ticket goes, though, I agree with the NAB right now,
 because the ISN does not appear to leak the host clock due to the 32bit
 truncation of 64ns ticks.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs