[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5460 [Tor Client]: Write proposal(s) to evaluate circuit crypto authentication
#5460: Write proposal(s) to evaluate circuit crypto authentication
------------------------+---------------------------------------------------
Reporter: mikeperry | Owner: nickm
Type: defect | Status: assigned
Priority: major | Milestone: Tor: 0.2.4.x-final
Component: Tor Client | Version:
Keywords: | Parent: #5456
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by arma):
Replying to [comment:4 mikeperry]:
> Ondrej pointed out that I2P's one-RTT circuit construction is very
useful for avoiding disclosing the length of your circuit. It might also
be useful for avoiding the per-hop MACs we'd need here.
There are a series of papers on one-RTT circuit construction for Tor. See
e.g. http://freehaven.net/anonbib/#sphinx-onion-fc10
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5460#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs