[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] [Discussion] 5 ^H 3 hops rendezvous circuit design



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 02/13/2014 11:43 AM, Zack Weinberg wrote:
> (Four hops is what I2P uses, with two chosen entirely by the client
> and two entirely by the server; but there appears to be nothing to
> guarantee that a malicious peer can't connect directly to its
> counterparty's two-hop chain, sacrificing some of its own anonymity
> but getting closerfor a while now to the counterparty.  I did just
> argue that that shouldn't matter, though...)

Just FTR, since 0.9.7.1 I2P defaults to 3 hops for "client" tunnels
(so default of 6 hops end-to-end, and 12 hops round-trip). And yes,
there is nothing stopping a malicious peer building zero-hop tunnels
(acting as its own Outbound Endpoint/Inbound Gateway), just as honest
clients or servers can choose to use zero-hop tunnels (e.g. a website
or IRC network that requires no anonymity of its own, but wants its
users to benefit).

str4d

> 
> zw
> 
> 
> 
> _______________________________________________ tor-dev mailing
> list tor-dev@xxxxxxxxxxxxxxxxxxxx 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBCgAGBQJS/f/RAAoJENXeOJaUpGWyUB8H/RI45Bc7TXc7y2SN0Tj1Sabz
Wwjqb4tb4fhcFV7C6biJEFg6sKR1GPnNAa6AsadoMREJ/KD64t9eoii1g38x/UdN
GxwHLk/h7zJCTRxMR0W89S7nIGimzp/I12urLXwYvvIoKjbytX1a9e3TkZpBmOvS
D1JvAhVeoMa2dUfjT4jZH83kGQ3PlWvYPOvyv5CiSgoE6KHXWn2pYfNiOQF8mzWU
oDU0TaNMsATjX/y1bwPAdf6w+DoKOw2xmpVyutY5+CYRC9BrvqAyV5WWwVvOTZHz
gTIYVToLGN79PBsMDT0nJoxvm58a734qR9XANo5fDegkJIWKY+Ac/cBwadq25A0=
=1wAz
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev