[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #17591 [Tor]: Use channel padding to obscure circuit setup
#17591: Use channel padding to obscure circuit setup
-----------------------------+-----------------------
Reporter: mikeperry | Owner: mikeperry
Type: enhancement | Status: new
Priority: Medium | Milestone:
Component: Tor | Version:
Severity: Normal | Keywords: mike-can
Actual Points: | Parent ID:
Points: | Sponsor:
-----------------------------+-----------------------
We could use the code from #16861 to pad more often during circuit setup
to defend against circuit fingerprinting by someone who is watching the
guard node. This would be somewhat complicated, as it would need special
timers that could be called more often than once per second (or could
chain off eachother), but it could be done.
On the client side, it could be done from any of the onionskin or circuit
launching calls. On the relay side, we probably would need some logic
around padding more often so long as we're still getting RELAY_EARLY
cells, or similar.
It's also debatable in general as to if circuit fingerprinting is still
successful if you're just watching the guard. If it's not, this may not be
worth doing (since it won't protect anyone from a malicious or compromised
guard).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17591>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs