[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #9925 [Tor]: Directory Authorities can crash client/relay



#9925: Directory Authorities can crash client/relay
------------------------+--------------------------------------------
     Reporter:  sysrqb  |      Owner:
         Type:  defect  |     Status:  needs_review
     Priority:  normal  |  Milestone:  Tor: 0.2.5.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  025-triaged andrea-review-0255
Actual Points:          |  Parent ID:
       Points:          |
------------------------+--------------------------------------------

Comment (by cypherpunks):

 About defense-in-depth by 016c4dcbcddc391515e2fdd0f28832679ab2fae5
 What happen if someday two different sd for different relays will have the
 same digest? Hash collision, non-zero chance?
 What about digest for md, digestmap functions about DIGEST_LEN while
 descriptor_digest for md about DIGEST256_LEN. And descriptor_digest is
 under control of attacker actually, they no need to proof they had onion
 keys. Can attacker to drop (by client) every md-consensus such way?

 And related to this thoughts but another problem perhaps.
 What about two rs with the same digest for md-consensus, in general? Can
 code handle it? (it's another problem perhaps) Attacker could to generate
 descriptor with onion and ntor keys from victim relay, and choose self id
 so every new client (without cached documents) will stuck without chance
 to get victim's keys (md will be assigned to attacker's rs by
 nodelist_add_microdesc) till next consensus update.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9925#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs