[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] automatically detect many new identical/similar bridges
> On 14 Dec. 2016, at 21:09, nusenu <nusenu@xxxxxxxxxxxxxxx> wrote:
>
> another raw idea:
>
> - would the bridge auth be willing to publish a randomly generated AS
> identifier (regenerated daily) that allows new bridges added on the same
> day to be grouped by that identifier without directly disclosing the AS
> itself.
Bridges don't necessarily contact the bridge auth before producing their
descriptors. So we'd need a protocol change to do this.
> Note: This introduces a confirmation opportunity, where attackers can
> learn the AS in which a new bridge is added if they added a bridge in
> the same AS on the same day. To reduce this problem it could be a hourly
> generated identifier.
How could we avoid an adversary brute-forcing all the possible ASs and
days/hours?
We can use the shared random value in the consensus to prevent relays
knowing their position on the hidden service hash ring in advance, but
there's nothing stopping someone brute-forcing it in arrears.
So we'd need a concrete protocol that would allow correlation, but not
be able to be brute-forced. And we'd need something that doesn't have
a single point of failure (if only we had two bridge authorities, they
could do the shared random protocol).
Hmm, still worth thinking about...
T
--
Tim Wilson-Brown (teor)
teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev