[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock



#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+-----------------
     Reporter:  source                |      Owner:
         Type:  defect                |     Status:  new
     Priority:  normal                |  Milestone:
    Component:  - Select a component  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+-----------------

Comment (by source):

 OK so if I understand correctly, the Tor's protocol inside the OpenSSL
 encryption layer never sends TCP ISNs or any other timestamps past the
 guard node.

 Wouldn't Tor (and any application) that operates on top of a Linux host's
 TCP Layer 3 still leak this information through no fault of their own?

 Diagram:

 Tor TCP protocol sanitizes time
 ====================
 OpenSSL timestamps eliminated
 ====================
 Linux TCP Layer 3 contains ISNs

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs