[tor-bugs] #5011 [Pluggable transport]: Discuss possible designs for an external program that discovers bridge addresses to tell Tor about them
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Tue Mar 13 04:45:02 UTC 2012
#5011: Discuss possible designs for an external program that discovers bridge
addresses to tell Tor about them
---------------------------------+------------------------------------------
Reporter: karsten | Owner: mikeperry
Type: task | Status: new
Priority: normal | Milestone:
Component: Pluggable transport | Version:
Keywords: MikePerry201203 | Parent: #5010
Points: | Actualpoints:
---------------------------------+------------------------------------------
Comment(by nickm):
Replying to [comment:15 mikeperry]:
>
> I was hoping we could get away with fixed port. I think any sort of
configuration is going to make people sad and confused, unless they're
walked through the pairing process to generate a secret and give it to
both Vidalia/Orbot and their plugin of the week. But how does that happen
on a phone?
Fixed port is going to be tricky, since we want to support multiple Tors
on one system.
I think there are also lots of per-system 'software bus' mechanisms for
IPC/registry stuff, but those aren't nice and general like what we're
talking about here.
> Can we skip the shared secret authentication step in initial
imlementations, or is it must-have even if we require that "IPC 1" has a
proper handshake, well-formed-or-die behavior, and triggers user
confirmation from Vidalia?
Depends on threat model, I guess. I don't really trust user confirmation
to get us out of this problem, since people are pretty bad about clicking
"ok" to everything, and since it's not clear that the average user could
even tell which of these messages would be out of the ordinary. So, do we
think that there is hostile software here that might want to deanonymize
people, and is that in the threat model we care about? If so, we need to
do _some_ kind of thing to keep that software from adding bridges before
we actually give this to users.
For the point of view of this spec and the March 15 deadline, it's
probably fine to say what kind of mechanism we need, mention a few
alternatives, and look for better alternatives as we go forward.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5011#comment:16>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list