[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] A modest proposal for a petname system in ideas/xxx-onion-nyms.txt



On Tue, 03 Jan 2012 19:52:00 +0000, Julian Yon <julian@xxxxxxxxxx> said:

    jry> Eventually Alice takes a vacation and Mallory is
    jry> successful at keeping the service offline for $expiry_time. At
    jry> this point the nym can be hijacked as no secret is needed to
    jry> claim it.

Two things here.

Firstly, the advertisement of the nym with the introduction hosts
would be signed with the hidden service's key, the pair
(Hash("somenym"), Srv_PubKey) would be kept cached around the network
allowing it to be reclaimed should the hidden service move
around. Similarly, to flesh things out, a nym could be released or
transferred with a similarly signed message.

Secondly, on the expiry, that idea was copied as I understood it from
the original proposal, designed to mitigate nym squatting, and
allowing nyms to be eventually recycled. I'm not necessarily convinced
by it and haven't thought about this aspect very closely. A malicious
nym squatter could trivially maintain lots of mappings directly
anyways. And likewise a clever DOS designed to cause the registration
to expire would make nym hijacking possible, and this is true, I
think, wherever there is an expiry mechanism.

Cheers,
-w
--
	       William Waites <wwaites@xxxxxxxxxxxxxxx>
 Visiting Researcher, Laboratory for Foundations of Computer Science
	    School of Informatics, University of Edinburgh

Attachment: pgplTXwVNuWWp.pgp
Description: PGP signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev