[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Proposal 176: Proposed version-3 link handshake for Tor
- To: or-dev@xxxxxxxxxxxxx
- Subject: Re: Proposal 176: Proposed version-3 link handshake for Tor
- From: George Kadianakis <desnacked@xxxxxxxxx>
- Date: Wed, 02 Feb 2011 23:11:51 +0100
- Delivered-to: archiver@xxxxxxxx
- Delivered-to: or-dev-outgoing@xxxxxxxx
- Delivered-to: or-dev@xxxxxxxx
- Delivery-date: Wed, 02 Feb 2011 17:12:05 -0500
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:from:to:subject:in-reply-to:references :user-agent:date:message-id:mime-version:content-type; bh=9f1q0uhfEH6A9TLEVh/YCd3GOFHPXsEAyusM3NorHPE=; b=glLMemgW0Dk02IVoWVIKMinXH7uxBTV8SK7n01JodHPrrzimT0gFfI6MO3f9wPBJGV 7xf6eSHp6pfXpxicwO23pWgoHSMF8cSkmok+AlFK2TBp6RXNiC3S9U4OHMoJhZZ4O4OL NkdceaM9HCRD6JVv1j1zZn86VRPgegUF4JPYQ=
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=from:to:subject:in-reply-to:references:user-agent:date:message-id :mime-version:content-type; b=QKez2+dsmmyCMwVPxGkGIXYYgQyFk2cDTw4OA4cloTA/0terSqWw7BexhHviZqwk7t h70r/18EoU2EEJXGp+EJifWNc024Do4zEltVl8zPlBrT+Cy50kNXLlPAXH6wnPqxnLYD ryZ3QcPLBPTGTFfaax6cRnMOWrxvNuyLUAow4=
- In-reply-to: <AANLkTinQjEz2C9MSyZNWABNMqqJrv9eFdbUY7VnMoAA4@xxxxxxxxxxxxxx> (Nick Mathewson's message of "Mon, 31 Jan 2011 21:50:06 -0500")
- References: <AANLkTinQjEz2C9MSyZNWABNMqqJrv9eFdbUY7VnMoAA4@xxxxxxxxxxxxxx>
- Reply-to: or-dev@xxxxxxxxxxxxx
- Sender: owner-or-dev@xxxxxxxxxxxxx
- User-agent: Microsoft Outlook Express 6.00.2900.5843
Nick Mathewson <nickm@xxxxxxxxxxxxx> writes:
> 2) We should make it harder to probe for a Tor server. Right
> now, you can just do a handshake with a server,
> renegotiate, then see if it gives you a VERSIONS cell.
> That's no good.
>
Since a way to avoid Tor server probing was not mentioned in the proposal
and the problem mentioned above is still present (although now the
prober sends a VERSIONS cell and waits for reply), I think we need to
define our probe-resistance.
Do we need all Tor servers, including normal relays and exit servers,
to be probe-resistant or just the bridges?
Since the Tor network is public - as far as the relays and exits are
concerned - making it probe-resistant would serve little purpose,
except for providing flexibility in case the network scheme changes in
the future [1].
On the other hand, probe-resistant bridges are essential - especially
with the increasing role of Tor as a circumvention tool.
The good thing with this is that bridge addresses are already provided
out of band, which allows us to also provide non-public information to
bridge users that will help anti-probing [2].
So do we care about a probe-resistant Tor network, or do we keep the
probe resistance for the circumvention tool part of Tor?
[1]:
https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#YoushouldhidethelistofTorrelayssopeoplecantblocktheexits.
[2]:
For example, a silly scheme would be to provide the bridge user with
another field called 'secret' - basically a per-bridge hash value -
that comes with the bridge address and bridge fingerprint. The
'secret' field should be sent to the bridge on the beginning of the
cell-based part of the V3 handshake and the handshake should proceed
only if the 'secret' field matches the 'secret' of the
bridge. Otherwise, the bridge should act accordingly as if it's
getting probed.