[tor-bugs] #1299 [Tor Client]: Tor should verify signatures before parsing
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Thu Nov 11 19:38:22 UTC 2010
#1299: Tor should verify signatures before parsing
------------------------------+---------------------------------------------
Reporter: mikeperry | Type: defect
Status: new | Priority: normal
Milestone: Tor: unspecified | Component: Tor Client
Version: 0.2.1.24 | Resolution: None
Keywords: | Parent:
------------------------------+---------------------------------------------
Changes (by nickm):
* priority: major => normal
* milestone: => Tor: unspecified
Old description:
> Right now Tor parses both consensus documents and router descriptors
> before verifying their
> signature. This exposes us to all sorts of potential MITM tampering and
> code execution bugs, of which
> we have recently had several. Right now, an adversary who finds a parsing
> exploit needs only to
> sign up as a directory mirror, or MITM 0.2.0.x clients that are not using
> tunnelled directory connections.
>
> Such an adversary can custom-craft payloads based on the fingerprint of
> the OS of the client that
> connects to them, and can also target specific clients for precision
> attacks.
>
> If we verify signatures before parsing, the adversary loses their ability
> to target specific clients
> by OS or by IP, and can at best publish a malicious router descriptor
> signed by them to everyone.
> This leaves us with a clear audit trail of where the exploit came from,
> and a record of all such
> attempts in the descriptor archives. This would be a considerably better
> position to be in than
> we are now.
>
> [Automatically added by flyspray2trac: Operating System: All]
New description:
Right now Tor parses both consensus documents and router descriptors
before verifying their
signature. This exposes us to all sorts of potential MITM tampering and
code execution bugs, of which
we have recently had several. Right now, an adversary who finds a parsing
exploit needs only to
sign up as a directory mirror, or MITM 0.2.0.x clients that are not using
tunnelled directory connections.
Such an adversary can custom-craft payloads based on the fingerprint of
the OS of the client that
connects to them, and can also target specific clients for precision
attacks.
If we verify signatures before parsing, the adversary loses their ability
to target specific clients
by OS or by IP, and can at best publish a malicious router descriptor
signed by them to everyone.
This leaves us with a clear audit trail of where the exploit came from,
and a record of all such
attempts in the descriptor archives. This would be a considerably better
position to be in than
we are now.
[Automatically added by flyspray2trac: Operating System: All]
--
Comment:
Moving to "unspecified" milestone.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1299#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list