[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] Sanitizing bridge descriptors containing ed25519 fields



On Sat, May 30, 2015 at 5:16 PM, Karsten Loesing <karsten@xxxxxxxxxxxxxx> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 30/05/15 16:44, Nick Mathewson wrote:
>> On Fri, May 29, 2015 at 4:23 PM, Karsten Loesing
>> <karsten@xxxxxxxxxxxxxx> wrote:
>>>> router euler [scrubbed] 8000 0 0 identity-ed25519 -----BEGIN
>>>> ED25519 CERT----- [scrubbed] -----END ED25519 CERT-----
>>>
>>> Base64-decode that block, throw it into SHA256(), base64-encode
>>> the result, format as block.  But wouldn't the result be much
>>> shorter? There's no new "fingerprint" equivalent, like
>>> "fingerprint-ed25519", is there?
>>
>> Oh dear.  That blob is a certificate, not a key.  It changes over
>> time, because the key that it certifies varies over time.
>>
>> The format is documented in section 2.1 of proposal 220; the
>> actual identity key is in an extension labeled with type 04 (see
>> section 2.2.1).
>>
>> Maybe we should add a fingerprint-ed25519 line?  It would be
>> redundant, but maybe valuable.  What do you think?
>
> I took a quick look at proposal 220, but not to the point that makes
> me entirely certain about this ed25519 stuff.  If anything below
> remains unclear, that might be because I'm not clear about it myself.
>  Please question everything I'm saying, even more than usual.
>
> Let's also include Damian on this thread.  He usually has good ideas
> about descriptors, and he knows about sanitizing bridge descriptors.
> And let's add Isis who is working a lot with bridge descriptors, too.
>  (There may be more people we should ask, but hey, it's tor-dev@.)
>
>
> So, I think a "fingerprint-ed25519" line would be useful.  It would
> make the bridge descriptor sanitizing process much easier.  It would
> also facilitate debugging network problems, because people can just
> grep descriptors rather than using specialized tools that know how to
> decode the cert.  And with microdescriptors in place it should be okay
> to add this line even if it's redundant information, because clients
> would never download it.

Hm.  Okay, that sounds solid enough.  I'll try to hack it in tonight
or Monday, and add it to prop220.


> If the server descriptor in #16227 were a bridge descriptor, I'd do
> the following steps for sanitizing it:
>
>  - Remove identity-ed25519 line and subsequent crypto block.

+1

>  - Keep yet-to-be-added fingerprint-ed25519 line, but SHA256 its value.
>  - Keep extra-info digest line, but SHA1 and SHA256 its values.

Suggestion: Don't use raw SHA256(x) but instead use SHA256("sanitize
ID for bridge descriptor" | x) or SHA256("sanitize extra-info digest
for bridge descriptor" | x). That way we don't need to worry about
colliding with something else that decides to SHA256 these.

>  - Remove onion-key line and subsequent crypto block.
>  - Remove signing-key line and subsequent crypto block.
>  - Remove onion-key-crosscert line and subsequent crypto block.
>  - Remove ntor-onion-key-crosscert line and subsequent crypto block.
>  - Keep ntor-onion-key line, mostly because we didn't remove it so
> far; unless it should be removed?
>  - Remove router-sig-ed25519 line.
>  - Remove router-signature line and subsequent crypto block.
>  - Add router-digest line with SHA1 of SHA1 of descriptor content and
> SHA256 of SHA256 of descriptor content; the rationale is that we don't
> have to write entirely new digests into the network status in order to
> match "r" lines with descriptors.

That all sounds fine.

>
> I also added the extra-info descriptor that corresponds to the server
> descriptor to #16227:
>
> https://trac.torproject.org/projects/tor/ticket/16227#comment:5
>
> I wonder, what's the best way for including the ed25519 identity in
> the extra-info descriptor?  How about extending the first line to:
>
> "extra-info Truie SHA1-of-RSA SHA256-of-ed25519"
>
> Possible downsides are that this additional value might break existing
> code and that it might be problematic to get rid of the SHA1-of-RSA
> part later.  But the same issues would come up with the
> "extra-info-digest" line in server descriptors, and maybe there are
> good solutions.
>
> Otherwise, a separate "fingerprint-ed25519" line might work here, too.

Plausible.

> In order to sanitize such an extra-info descriptor, I'd do these steps:
>
>  - Keep extra-info line, but SHA1 (and possibly SHA256) its value(s).

See above.

>  - Or, keep yet-to-be-added fingerprint-ed25519 line, but SHA256 its
> value.

See above.

>  - Remove router-sig-ed25519 line.
>  - Remove router-signature line and subsequent crypto block.
>  - Add router-digest line with SHA1 of SHA1 of descriptor content and
> SHA256 of SHA256 of descriptor content; same rationale as above, but
> with the "extra-info-digest" line in server descriptors.
>
> What do you think?
>

Sounds fine.
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev