[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Proposal 222: Stop sending client timestamps
Nick Mathewson <nickm@xxxxxxxxxxxxxx> writes:
> Filename: 222-remove-client-timestamps.txt
> Title: Stop sending client timestamps
> Authors: Nick Mathewson
> Created: 22 August 2013
> Target: 0.2.5.x
> Status: Open
>
> 0. Summary
>
> There are a few places in Tor where clients and servers send
> timestamps. I list them and discuss how to eliminate them.
>
> 1. Introduction
>
> Despite this late date, many hosts aren't running NTP and
>
> <snipage>
>
> field, so this change should be safe.
>
> 2.2. AUTHENTICATE (server)
>
> The AUTHENTICATE cell is not ordinarily sent by clients. It
> contains an 8-byte timestamp and a 16-byte random value.
> Instead, let's replace both with a 24-byte (truncated) HMAC of
> the current time, using a random key.
>
> This will achieve the goal of including a timestamp in the
> cell (preventing replays even in the presence of bad entropy),
> while at the same time not including the time here.
>
Hey Nick,
how does the client verify the contents of the AUTHENTICATE cell
(including the timestamp), if the timestamp is encrypted with a random
key?
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev