[tor-bugs] #5565 [Tor Relay]: MyFamily should provide an alternate non-idhex subscription mechanism

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Apr 4 06:32:04 UTC 2012


#5565: MyFamily should provide an alternate non-idhex subscription mechanism
-------------------------+--------------------------------------------------
 Reporter:  mikeperry    |          Owner:                    
     Type:  enhancement  |         Status:  new               
 Priority:  normal       |      Milestone:  Tor: 0.2.4.x-final
Component:  Tor Relay    |        Version:                    
 Keywords:               |         Parent:  #5563             
   Points:               |   Actualpoints:                    
-------------------------+--------------------------------------------------

Comment(by mikeperry):

 Replying to [comment:6 rransom]:
 > If you're worried about a relay's host obtaining a relay's secret keys,
 you can't rely on storing a relay family's secret key in its torrc or
 DataDirectory.
 >
 > Should we worry about an attacker who compromises a relay's identity key
 being able to claim to be in that relay's families forever?  If not, then
 an operator can generate a family-membership signature once per relay, put
 it in the relay's torrc, and have the relay put that signature in its
 descriptors (thereby cross-certifying it with the relay's identity key).

 Yeah, this is how we would do a family key deployment. The key would
 ideally be used to sign a statement offline once, and then that signed
 statement would be used for time period T.

 However, I think we should first try to find issues with a simple UUID-
 based solution. Are there any?

 > If we do worry about that replay attack, things get messier; a relay's
 operator will need to generate family-membership signatures once per
 $INTERVAL per relay, and then upload them to the relay periodically.  (In
 this case, I wouldn't recommend putting the signature itself in the torrc;
 reference a separate file instead.)

 Hrmm.. Yeah, already the complexity mounts. I forgot about re-using old
 signatures and setting time limits/expiry. Thanks.

 > Or should we just drop the MyFamily feature entirely, on the assumption
 that only good guys try to use it in a non-malicious way?

 Well, what about the UUID-based solution? Nick may or may not come up with
 attacks in his dreams. Can we think of any while we're awake? I am not
 seeing any, but I am also biased against complexity..

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5565#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list