[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Another key exchange algorithm for extending circuits: alternative to ntor?
On 8/8/12, Nick Mathewson <nickm@xxxxxxxxxxxxx> wrote:
> http://www.infsec.cs.uni-saarland.de/~mohammadi/owake.html
Also, where does this paper specify that the participants must check
that public-key group elements are not equal to the identity element?
That's rather important, as Tor's relay protocol is likely to break if
an attacker can force a server to open additional circuits to an
attacker using the same key material that a legitimate client's
circuit has.
Robert Ransom
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev