[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r13211: condense the rest of the discussion into proposal 129 (tor/trunk/doc/spec/proposals)



Author: arma
Date: 2008-01-21 12:36:47 -0500 (Mon, 21 Jan 2008)
New Revision: 13211

Modified:
   tor/trunk/doc/spec/proposals/129-reject-plaintext-ports
Log:
condense the rest of the discussion into proposal 129


Modified: tor/trunk/doc/spec/proposals/129-reject-plaintext-ports
===================================================================
--- tor/trunk/doc/spec/proposals/129-reject-plaintext-ports	2008-01-21 16:57:12 UTC (rev 13210)
+++ tor/trunk/doc/spec/proposals/129-reject-plaintext-ports	2008-01-21 17:36:47 UTC (rev 13211)
@@ -1,11 +1,15 @@
-Below is a proposal to mitigate insecure protocol use over Tor.
-
+Filename: 129-reject-plaintext-ports.txt
 Title: Block Insecure Protocols by Default
+Version: $Revision$
+Last-Modified: $Date$
 Author: Kevin Bauer & Damon McCoy
-Date: January 15, 2008
+Created: 2008-01-15
+Status: Open
 
 Overview:
 
+  Below is a proposal to mitigate insecure protocol use over Tor.
+
   This document 1) demonstrates the extent to which insecure protocols are
   currently used within the Tor network, and 2) proposes a simple solution
   to prevent users from unknowingly using these insecure protocols. By
@@ -38,9 +42,14 @@
 
 Security Implications:
 
-  None. This proposal is intended to improve Tor's security by limiting the
+  This proposal is intended to improve Tor's security by limiting the
   use of insecure protocols.
 
+  Roger added: By adding these warnings for only some of the risky
+  behavior, users may do other risky behavior, not get a warning, and
+  believe that it is therefore safe. But overall, I think it's better
+  to warn for some of it than to warn for none of it.
+
 Specification:
 
   As an initial step towards mitigating the use of the above-mentioned
@@ -88,3 +97,19 @@
       http://www.wired.com/politics/security/news/2007/09/embassy_hacks.
       Wired. September 10, 2007.
 
+Implementation:
+
+  Roger added this feature in
+  http://archives.seul.org/or/cvs/Jan-2008/msg00182.html
+  He also added a status event for Vidalia to recognize attempts to use
+  vulnerable-plaintext ports, so it can help the user understand what's
+  going on and how to fix it.
+
+Next steps:
+
+  a) Vidalia should learn to recognize this controller status event,
+  so we don't leave users out in the cold when we enable this feature.
+
+  b) We should decide which ports to reject by default. The current
+  consensus is 23,109,110,143 -- the same set that we warn for now.
+