[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: a serious TOR adversary?



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Eugene Y. Vasserman wrote:
(snip)
> "Furthermore, we show that a well-provisioned adversary, using a
> topological map of the network, can trace-back the path of an anonymous
> user in under 20 minutes."
> 
> Most Tor circuits only live a maximum of 10 minutes, no? I never figured
> out just how much of hard limit this is. Can an application ask to keep
> the circuit longer? Can someone in the know clue me in?
> 
> Eugene
> 

If I remember right, a circuit will accept new streams (usually meaning
new connections to servers) for a maximum of 10 minutes.

However, once a  connection has been established, the circuit it's using
will remain open until:

1.) The application closes the connection (if it reconnects, it'll use a
new circuit);

2.) The circuit "dies," like from a node or a link going down.

- --
F. Fox
AAS, CompTIA A+/Network+/Security+
Owner of Tor node "kitsune"
http://fenrisfox.livejournal.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
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=76Q3
-----END PGP SIGNATURE-----