[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community
#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
    Reporter:  mike123           |       Owner:  mike123
        Type:  enhancement       |      Status:  closed 
    Priority:  normal            |   Milestone:         
   Component:  TorBrowserButton  |     Version:         
  Resolution:  invalid           |    Keywords:         
      Parent:                    |      Points:         
Actualpoints:                    |  
---------------------------------+------------------------------------------
Comment(by rransom):
 Replying to [comment:34 textbrowser]:
 > Replaced cookies.db. The database now houses encoded values of raw
 forms. One field.
 Good.  That prevents a whole class of attacks.
 > Researching the suggestion pertaining to the use of hashes of
 passphrases as cipher keys.
 See the documentation for `gcry_kdf_derive` for the recommended standard
 way to convert a passphrase into a key.
 > The important conclusion is that "Doobie" isn't a bogus project. We're
 still evolving, learning, twisting.
 Thanks for fixing those issues.  I thought you weren't interested in
 fixing them.
 Also, you probably need to remove the IV from the beginning of a
 ciphertext buffer before decrypting it.
-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:35>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs