[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #19317 [Metrics/CollecTor]: Sanitize TCP ports in bridge descriptors
#19317: Sanitize TCP ports in bridge descriptors
-----------------------------------+-----------------
Reporter: karsten | Owner:
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Metrics/CollecTor | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
-----------------------------------+-----------------
We should consider sanitizing TCP ports in bridge descriptors. Let's add
a new sanitizing step between 3 and 4 here:
https://collector.torproject.org/#bridge-descriptors
4. Replace TCP port with TCP port hash: It may be less obvious that TCP
ports need to be sanitized, but an unusual TCP port used by a high-value
bridge might still stand out and provide yet another way to locate and
block the bridge.
- Each non-zero TCP port is replaced with `H(port | bridge identity |
secret)[:2] % 65535 + 1` written as decimal number. The input `port` is
the 2-byte long binary representation of the TCP port. The `bridge
identity` is the 20-byte long binary representation of the bridge's long-
term identity fingerprint. The `secret` is a 33-byte long secure random
string that changes once per month for all descriptors and statuses
published in that month. `H()` is SHA-256. The `[:2]` operator means
that we pick the 2 most significant bytes of the result. TCP ports that
are 0 in the original descriptor are left unchanged.
In order to make this change we'll need to write and test the code and re-
process all bridge descriptors since 2008. The last part is going to take
at least a week, maybe longer.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19317>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs