[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock



#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+--------------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  closed
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:  not a bug             |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+--------------------

Comment (by mikeperry):

 An extra question here is if it is possible to reconstruct even these 32
 bits of time value than remain from the ISN, which would potentially
 assist correlation even without the full clock.

 I don't think that is possible either, because net_secret is 128 bits and
 the connection tuple should make replays rare, but the use of MD5 is
 concerning here. If this were possible, it also seems like that should
 reduce to ISN prediction, as well, though.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs