[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] Sharing Circuits Between Onion Servers and Clients



Hi all,

I want to promote some recent work of mine in the hope that someone here will find it interesting or useful. In my most concise language, it is a "decentralized, asynchronous entropy generator protocol." I've made a somewhat complete demo implementation so far. Here's the repository: https://github.com/devnetsec/rand-num-consensus. The integrity of the entropy can only be compromised if all nodes in the ring are malicious and coinciding. Currently, a Tor client cannot anonymously connect to an onion service by directly contacting the rendezvous point, because that relay could have been chosen maliciously by the onion server. I wager that a scheme like this could enable onion servers and clients to share the same circuit. Both parties would have a guarantee that their relays were chosen randomly.

The most similar solution I could find to this was in the TorCoin paper, but it appears to require a more complicated zero-knowledge proof. If there is serious interest in this, I'd be willing to write a proposal draft. Besides implementation difficulty, is there any outstanding flaw in this idea?


Best Regards,

Dylan Downey [devnetsec]
-----BEGIN PGP MESSAGE-----

owFVVE2IHEUYnZhETENivExOwc+JISizswTxsiCBbMSdIAiaiyQKNdVfdxdbXdVb
P9v2gkfFgIScBA8SQRAv4i0XMaeIB68exFsuHjzpwYuExFc1M1lym+n+6r33vfeq
b588OirGO3vz+3dOb0+O/PrXYlSfeW6yo0hoPS2KOfXCBAqWOmdbG5i8bZkcS8bj
3rpdshW1yjApQ6FhamzH+CFCnrR40bBj6pXWVClTkgoYDXjmgzI1WUfRcxX1jOaG
2oFa6wNJa6TyTFqYOoqap/mYJ0GTMnM7odUBl1MSfjCycdbY6Cm9sN1ANRt2IgAb
soOVVs8mNL+wz9SKkoGStPVJpLRtpxl7ldxaUulPCxQRlDWYokq4Ge1A7QWf13Pc
Wa+APGxRE0LntzY3axWauJgBarPkfcPBs9x0wpQbJrYbWMWz8dHP6FrDeffaqTAk
4xLiWrMUhqzRAy04q4LfcAB+VSkLMrZkvzbZJeeES+toJVVaHXQ4pmBbiZcz2o7O
AVoPsIiuwQmpVcoMNMYGjFsztDgIQig0LHPKWUNend2+kkyLgUqFuMNyLgiZU1ta
YUo+2E/kHYjDFMqlQJjL+B1rkc5EXVIjYP2C2ZBsLNw41J32HTLcIS/D8lS8mt0S
CnnJBrmQVrsJHUVY4rIRC/300ZUTeVmfVvJNMioxeAEIqZyMKszosg0NdcIFBV/7
Q5mC0DikF3i1CI4qt1wHg6nMqyVSxLbVw6woUrK5uF61SguH6uiYOzRfSc3dh5ys
vhdPokQ023APSjp2sDCGVHXRdSxc1u94LyIB6GqtW1YD3omAahywsxu7xvaay5pT
120F63KvMAoieJLbsb5xS1blp7gNZWpaupc5UEs9Wsmfgwc4KLnQVDpRJafYq1y+
p29HqapKyagDKqb8ilMYFDsGH+BNwq206NekBBRxqSiKy0nJu1wLV3p8ZK4MuOZ0
xfaGB7r+5Ap9UHwWj43Gxejs+KVjH728F2++/caJv395eHf9uTr+TPpWjYoTp9dP
Xn0wenjq1uStV5598Z+7N4cP37z63Tsv/PjFmVPPf3/+xqfT8Q/Xf/5p9Pjj1+58
cu/G/d8ffX38/a2LX/374PXJ+I8vv7363p//nfvm5G9H/wc=
=Xo6U
-----END PGP MESSAGE-----

Attachment: gpg.key
Description: Binary data

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev