[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] Location-aware persistent guards
Maxim Kammerer:
> Hi,
>
> Lately, the question of persistent Tor entry guard nodes in live
> distributions has been raised in a few places. Typically, the
> conclusion is that /var/lib/tor/data should be made persistent. I see
> it as problematic, since a live distro can be expected to be moved
> around more frequently than a typical desktop, or even a laptop. If we
> consider the current 882 Guard+Fast+Stable nodes in Tor consensus as a
> rough (or perhaps exact, not sure) estimate of nodes that can be
> selected as guards by Tor clients, then there are ~114M possibilities
> for selecting 3 guards, which, essentially, uniquely identifies a Tor
> user to a close traffic observer.
>
> In last comment in [1], Roger says that location-aware “profiles”
> would be nice, but difficult to implement safely. I don't see any
> problem with implementing such profiles, and think that the
> implementation can be even safer. It's pretty simple, actually: keep a
> secret persistent cookie, then upon Tor startup, concatenate it with
> the current public IP (or, say, its /24 part), use the result as a
> salt for hashing candidate guard nodes fingerprints, then sort and
> take the top 3. The additional benefit is that an attacker who gains
> access to Tor persistent state will not know which guard nodes were
> used without knowing an IP (although, a global observer might still
> iterate over all IPs that connected to Tor). There is a minor
> bootstrap issue of finding out the public IP (does this require an
> existing circuit at present?).
>
> Comments? Also, is making just /var/lib/tor/data/state persistent
> (instead of the whole directory) enough at the moment to have
> persistent guards?
>
> [1] https://blog.torproject.org/blog/research-problem-better-guard-rotation-parameters
>
Hello,
As commented in
https://trac.torproject.org/projects/tor/ticket/2653#comment:10 and
after reading the whole ticket, I believe it would be best to use a
pin/password to determine which guards to use.
The advantage of this is, it doesn't require any persistence.
Cheers,
adrelanos
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk