[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5220 [Tor Client]: Intelligently use capabilities/privileges and drop what we don't need for Debian Gnu/Linux
#5220: Intelligently use capabilities/privileges and drop what we don't need for
Debian Gnu/Linux
-------------------------+--------------------------------------------------
Reporter: ioerror | Owner:
Type: enhancement | Status: needs_information
Priority: major | Milestone: Tor: unspecified
Component: Tor Client | Version: Tor: unspecified
Keywords: security | Parent: #5219
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by cypherpunks):
>Please explain in more detail so that someone can break this part.
I'm not familiar with the code base. But as I said, I have my doubts as
well whether this strategy would work at all, except for the pluggable
transport:
>A pluggable transport server has access to clients' IP addresses, can log
the times, sizes, and directions of traffic burts, and can redirect all
connections from new clients to an attacker-controlled relay for circuit-
level traffic logging.
Isn't that the same capabilities as the ISP already has? None of that,
even combined necessarily breaks the user's security expectations. But
they are broken if the transport server can be remotely exploited to phone
home through a circuit as opposed to directly sending malformed packets as
a neighboring node. Still, it "rises the bar". That's all we can hope for,
till Tor is completely formally verified.
I think far more fruitful than introducing a multi-process architecture
now is compiler hardening and thinking about the TorBrowser security
architecture...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5220#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs