[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #30477 [Core Tor/Tor]: Tor should self-test reachability of TCP listeners exposed by PT's
#30477: Tor should self-test reachability of TCP listeners exposed by PT's
-------------------------------------------------+-------------------------
Reporter: ahf | Owner: (none)
Type: task | Status: new
Priority: Medium | Milestone: Tor:
| unspecified
Component: Core Tor/Tor | Version: Tor:
| unspecified
Severity: Normal | Resolution:
Keywords: tor-pt, network-team-roadmap- | Actual Points:
november, s30-o23a3 |
Parent ID: #30471 | Points:
Reviewer: | Sponsor:
| Sponsor30-must
-------------------------------------------------+-------------------------
Comment (by phw):
Replying to [comment:12 teor]:
> Replying to [comment:10 nickm]:
> > > If a transport exposes a TCP port, connect to that TCP port via a
Tor Exit.
> >
> > Question: what if the attacker runs an exit in order find out where PT
ports are?
>
> Bridges already do reachability checks via a random relay's ORPort: so
we have accepted a similar risk in the past.
[[br]]
It may be a good time to re-consider this risk now. Over at #31874, we're
brainstorming a service that takes as input a bridge line and then tests
the given bridge. We may want such a service instead of, or in addition to
Tor self-testing its PT bridge. The downside of this service (which we
could couple with BridgeDB) doing the testing is that it takes a while
until the bridge operator learns if their bridge works.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30477#comment:13>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs