[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7679 [Tor]: Test integration of Minion with Tor relays
#7679: Test integration of Minion with Tor relays
-----------------------+----------------------------------------------------
Reporter: arma | Owner:
Type: project | Status: new
Priority: normal | Milestone: Tor: unspecified
Component: Tor | Version:
Keywords: tor-relay | Parent:
Points: | Actualpoints:
-----------------------+----------------------------------------------------
Changes (by nickm):
* keywords: => tor-relay
Comment:
Interesting stuff!
For what it's worth, Tor's still using openssl and isn't currently moving
to NSS.
The part I wonder about for us is that it's not actually trivial to handle
Tor cells out-of-order: they aren't self-framing and the streams aren't
self-synchronizing, so if I decrypt a TLS record out-of-order, I don't see
how I can know whether that record's contents starts in the middle of a
Tor cell or at the beginning, and so on. Even if I know I'm getting a
cell, I need to know how many intervening cells there have been on that
circuit, or I won't know how to decrypt the cell.
These aren't insurmountable obstacles, but they do suggest that we'd need
to change the Tor link protocol in order to take advantage of Minion.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7679#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs