[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #16659 [- Select a component]: Linux TCP Initial Sequence Numbers may aid correlation
#16659: Linux TCP Initial Sequence Numbers may aid correlation
--------------------------------------+----------------------
Reporter: source | Owner:
Type: defect | Status: reopened
Priority: normal | Milestone:
Component: - Select a component | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+----------------------
Comment (by yawning):
Replying to [comment:14 nickm]:
> I'm going to reopen this. I still say that the best point at which to
try to resist stuff of this kind is at the application level, but
resisting it better locally too can't be a bad idea.
Well, there is one thing that we can do, though it'll be a lot of code
(that I won't write). Since part of the hash input is the TCP source
port, we can use our cryptographic random number generator and explicitly
randomize the source port on Linux (probably optionally). This should
mostly mitigate the "attack" in question.
I still think this is extremely hard to exploit (bordering on "there are
better things you can do if you are in a position to do so") and a kernel
issue rather than a Tor issue.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16659#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs