[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Tor compromised?



On 2011-10-14, torvlnt33r@xxxxxxxxxxx <torvlnt33r@xxxxxxxxxxx> wrote:
> A guess is that there might be a link between the bridges
> enumeration attack mentioned in that article and the recent spike
> in bridge use, for which one of the hypotheses was a botnet
> (https://lists.torproject.org/pipermail/tor-talk/2011-September/0
> 21347.html).
>
> Creating many circuits through the bridges is a way to make them
> visible to a large proportion of relays, including potentially
> malicious ones.

You can only create many circuits through a bridge if you already know
its TCP address.

> A possible countermeasure might be something similar to the
> "Entry Guards" mechanism for circuits that go though bridges.

We plan to make bridges direct their clients' circuits through their
entry guards.  See
https://svn.torproject.org/svn/projects/misc/rransom/2011/dev-meeting-photos-2011-07-25-01/orig/100_2373.jpg
for the few notes we have online from when we discussed bridge
concealment at the Tor developer meeting this summer.


Robert Ransom
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk