[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16659 [- Select a component]: Linux TCP Initial Sequence Numbers may aid correlation



#16659: Linux TCP Initial Sequence Numbers may aid correlation
--------------------------------------+--------------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  closed
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:  not a bug             |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+--------------------

Comment (by proper):

 NTP, as per [https://www.ietf.org/rfc/rfc5905.txt NTP RFC] does leak the
 local clock.

    Origin Timestamp (org): Time at the client when the request departed
    for the server, in NTP timestamp format.

    Destination Timestamp (dst): Time at the client when the reply
    arrived from the server, in NTP timestamp format.

 So using it doesn't make things better, but worse. (Also NTP is in default
 configuration unencrypted/unauthenticated, therefore accessible to
 observation and modification by any ISP level adversary.)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs