[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #7277 [Tor]: timestamp leaked in TLS client hello



#7277: timestamp leaked in TLS client hello
------------------------+---------------------------------------------------
 Reporter:  proper      |          Owner:                    
     Type:  defect      |         Status:  new               
 Priority:  normal      |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor         |        Version:                    
 Keywords:  tor-client  |         Parent:                    
   Points:              |   Actualpoints:                    
------------------------+---------------------------------------------------

Comment(by nickm):

 Replying to [comment:2 asn]:
 > I know that we like protocol properties to be symmetric on clients and
 servers, but since we agree that timestamp leaking is potentially
 dangerous, would it make sense to wipe the NETINFO `timestamp` in the case
 of clients/bridges?

 That's #4852. The comment there was saying, if I interpret correctly "Why
 even bother removing the timestamp from netinfo so long as the TLS
 timestamp still exists? What would that achieve?"  arma's response there
 seems plausible to me.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7277#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs