[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #16659 [- Select a component]: TCP Initial Sequence Numbers Leak Host Clock
#16659: TCP Initial Sequence Numbers Leak Host Clock
--------------------------------------+--------------------
Reporter: source | Owner:
Type: defect | Status: closed
Priority: normal | Milestone:
Component: - Select a component | Version:
Resolution: not a bug | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+--------------------
Comment (by mikeperry):
An extra question here is if it is possible to reconstruct even these 32
bits of time value than remain from the ISN, which would potentially
assist correlation even without the full clock.
I don't think that is possible either, because net_secret is 128 bits and
the connection tuple should make replays rare, but the use of MD5 is
concerning here. If this were possible, it also seems like that should
reduce to ISN prediction, as well, though.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs