[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Hidden service persistent connections



On 05/20/2019 07:55 AM, George Kadianakis wrote:
> Memory Vandal <memvandal@xxxxxxxxx> writes:
> 
>> Hi,
>>
>> Are client connections to a hidden service .onion address that do not
>> disconnect for hours safe?
>>
>> It may be a big file download or multiple keep-alive transactions that uses
>> the established connection over and over for lets say few hours.
>>
>> If its not safe then what should be the max time a connection to .onion
>> service should get disconnected so that it uses a new circuit when it
>> reconnects?
>>
> 
> What kind of attacks are you worried about? I don't see any serious
> threats for onion service clients when it comes to long lasting connections.

Perhaps there's increased risk of malicious-relay attacks and/or traffic
correlation? I vaguely recall papers about that.
-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk