[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9854 [Tor]: Removing or not sanitizing ContactInfo lines in bridge descriptors
#9854: Removing or not sanitizing ContactInfo lines in bridge descriptors
-------------------------+------------------------------
Reporter: karsten | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: unspecified
Component: Tor | Version:
Resolution: | Keywords: tor-bridge
Actual Points: | Parent ID:
Points: |
-------------------------+------------------------------
Comment (by wfn):
At least as far I (as a very-small-time bridge operator, i.e.) am
concerned, I'm fine with option 2, i.e.
> We decide this information is important and that we should have it
available more easily. We don't remove the ContactInfo line when we
sanitize bridge descriptors.
Perhaps there's some critical vulnerability and all bridge operators
should upgrade as soon as possible (they should of course follow Tor-vuln-
related news anyway); etc.
I don't know what other bridge operators put in the ContactInfo; perhaps
someone with access to non-sanitized descriptors could try and browse
through a representative sample, to see if anyone is including any
critical info (e.g. perhaps there are mail addresses with a domain that
resolves to the IP address used by the bridge; someone could scrape over
bridges from Onionoo / descriptors (when they include ContactInfo), and
try extracting some exit IPs; probably highly unlikely though / doesn't
sound plausible?)
Is any kind of harassment possible (someone extracts email addresses from
sanitized bridge descriptors, etc.) - should bridge operators be left to
be as anon as possible? (They should be ready for this kind of thing
anyway, I suppose.) Many social impure parameters.
TL;DR option 2 is worth some discussion, IMHO.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9854#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs