[tor-bugs] #11207 [Tor]: Sybil selection should be trickier to game
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Mar 15 01:56:25 UTC 2014
#11207: Sybil selection should be trickier to game
-------------------------------------+------------------------------------
Reporter: nickm | Owner:
Type: enhancement | Status: new
Priority: major | Milestone: Tor: 0.2.6.x-final
Component: Tor | Version:
Keywords: tor-auth needs-proposal | Actual Points:
Parent ID: | Points:
-------------------------------------+------------------------------------
In response to some of the hidden service attack papers from 2013, we made
it harder to use sybil-based tricks to move around the HSDir hash ring.
But really, we should come up with a better way to shut down sybil-based
tricks in general, in case there are more that we don't know about.
One place to start would be with the question: how often does the sybil
code actually get invoked for legit nodes not run by security researchers?
If the answer is "infrequently" , then perhaps we could move to an even
simpler, blunter approach of "Call all nodes on an IP down for as long as
there are too many verified-connectable nodes on that IP."
Or we might take another approach to selecting which nodes to list. #8710
isn't right, but perhaps something else might be.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11207>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list