[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #25552 [Core Tor/Tor]: prop224: Onion service rev counters are useless and actually harmful for scalability
#25552: prop224: Onion service rev counters are useless and actually harmful for
scalability
-----------------------------------------------+---------------------------
Reporter: asn | Owner: dgoulet
Type: defect | Status:
| needs_review
Priority: Medium | Milestone: Tor:
| 0.3.4.x-final
Component: Core Tor/Tor | Version: Tor:
| 0.3.1.9
Severity: Normal | Resolution:
Keywords: tor-hs prop224 034-roadmap-master | Actual Points:
Parent ID: | Points: 4
Reviewer: asn | Sponsor:
-----------------------------------------------+---------------------------
Comment (by asn):
Also see `bug25552_blinding` for an alternative design suggested by Nick,
which blinds the `time(NULL)` timestamp with a hash derived from the
ephemeral blinded key as such:
{{{
uint32_t BLINDING_FACTOR = SHA3(ephemeral_blinding_key)[4]
uint64_t REV_COUNTER = now + BLINDING_FACTOR
}}}
IIUC, this offers the same properties as the OPE approach: monotonically
increasing rev counter, with no state file needed, and with obfucated
local time, but it requires time sync between load balancing nodes. It
also seems easier to understand/review than the OPE approach.
Nick what you think?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/25552#comment:30>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs