[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Is Taking Checksum of Packet Payloads a Vulnerability?



On Sat, Dec 17, 2011 at 11:49 AM, Daniel Cohen <danielc192@xxxxxxxxx> wrote:
> Is this a problem with Tor's architecture? If so, has this issue
> already been addressed?

You're mistaking the normal purpose of entry nodes.

Normally if Alice is using Tor then she is running it herself. If she
is running it herself the traffic is encrypted between her and the
subsequent nodes. I don't just mean the end to end httpsâ Tor itself
encrypts the traffic so that the traffic leaving her node can only be
read by the next hop. Effectively, for this purpose, the traffic
'enters' the tor network inside Alice's  computer.  The packets
observable as not identifiable as the ones leaving the network later.

If Alice was in fact not running Tor herself, then the 'entry' node
could completely compromise her privacy without checksums or exit
sniffing or anything like that, which is why Tor is not used that way.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk