[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17604 [Tor]: Try to use only one canonical connection



#17604: Try to use only one canonical connection
-----------------------+---------------------------
 Reporter:  mikeperry  |          Owner:  mikeperry
     Type:  defect     |         Status:  new
 Priority:  Medium     |      Milestone:
Component:  Tor        |        Version:
 Severity:  Normal     |     Resolution:
 Keywords:             |  Actual Points:
Parent ID:  #16861     |         Points:
  Sponsor:             |
-----------------------+---------------------------

Comment (by mikeperry):

 I'm also tempted to patch channel_tls_matches_target_method() so that it
 allows extend cells to be sent on an orconn if they match either the
 descriptor address or the actual originating address of an orconn. This
 would also help converge on a single orconn for relays that have outbound
 traffic from different IPs as their inbound traffic.

 However, it will also mean that it becomes possible to steal a relay's
 keys and start making TLS connections to all other relays from anywhere on
 the Internet, and wait for those connections to become old enough to be
 chosen for extends. This issue may outweigh the corner case. It probably
 does, in fact. Happy to hear thoughts, though. Maybe there are other
 things that would prevent this attack?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17604#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs