[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-dev] v3 hidden services: inconsistencies between spec and implementation



On 29 Oct 2017, at 01:30, George Kadianakis <desnacked@xxxxxxxxxx> wrote:

>> # 220-ecc-ids-keys.txt

Is this the latest version of the ECC ID specification?
Usually, our proposals are integrated into the main spec documents
after they are implemented.

>> # 2.1
>> 
>> * 'The signature is formed by signing the first N-64 bytes of the
>>  certificate prefixed with the string "Tor node signing key certificate
>>  v1".' I found this to be false; the signatures only validate without
>>  the string prefix.
>> 
> 
> Ouch... I think we should edit the spec and consider if there are any
> security risks here.

One security risk is that signatures on these certificates are re-usable
in other contexts. For example, if two different parts of the Tor code
believe signed certificates without prefixes, an adversary can take a
certificate signed for one of them, and pass it to the other.

>> ## A.1
>> 
>> * I realized that the certificate types here are outdated. The
>>  signing-key extension is listed as type [04], when in rend-spec-v3.txt
>>  and the C implementation it is type [08].
> 
> Let's fix the spec here too...

This should definitely be integrated into one of the main specs.

T
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev