[tor-bugs] #10887 [Obfsproxy]: ScrambleSuit should make it easy for bridge admins to learn password

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu May 8 21:43:52 UTC 2014


#10887: ScrambleSuit should make it easy for bridge admins to learn password
-------------------------+-------------------------------------------------
     Reporter:  phw      |      Owner:  phw
         Type:           |     Status:  needs_revision
  enhancement            |  Milestone:
     Priority:  normal   |    Version:
    Component:           |   Keywords:  scramblesuit, password, shared
  Obfsproxy              |  secret
   Resolution:           |  Parent ID:
Actual Points:           |
       Points:           |
-------------------------+-------------------------------------------------

Comment (by yawning):

 Replying to [comment:11 asn]:
 > I fixed the above errors and another one (I caught `b32decode()`
 exceptions) and it can be found in `bug10887` in my repo.

 `ec61559` ACK.
 `aa3a99c` NACK for now. See discussion below.
 `9840bac` ACK the change.  Commit message should reflect what's being
 changed though.

 > Unfortunately, it still doesn't work perfectly:
 > {{{
 > # cat pt_state/scramblesuit/server_descriptor
 > Bridge scramblesuit 0.0.0.0:33647
 password=S5JY6IRCLLNEGTWBWZMYVIXHFWTITZBE
 > }}}
 > That's because the bindaddr that is passed from Tor is `0.0.0.0`
 (`IPADDR_ANY`):
 > {{{
 >  'config': {'ORPort': ('127.0.0.1', 42331),
 >             'allTransportsEnabled': False,
 >             'authCookieFile': None,
 >             'extendedORPort': None,
 >             'managedTransportVer': ['1'],
 >             'serverBindAddr': {'obfs3': ('0.0.0.0', 40674),
 >                                'scramblesuit': ('0.0.0.0', 33647)},
 >             'serverTransportOptions': None,
 >             'stateLocation': '/usr/local/var/lib/tor2/data/pt_state/',
 >             'transports': ['obfs3', 'scramblesuit']},
 > }}}
 >
 > However, I'm still tempted to merge this since it's the only way for
 people to get their automatically-generated passwords. However, maybe we
 should remove the whole Bridge line and just leave the password bit, so
 that we don't give users the illusion that that bridge line would actually
 work.

 I would rather see the bridge line changed to only contain the password
 before merging (the generated bridge line also neglects to include a
 bridge fingerprint since the information is unavailable to the PT
 currently).  Only including a password line is better than having a bridge
 line that is wrong and incomplete.

 > Also, on my way to fixing the above, I set the default state directory
 in external mode to be the current working directory. Is this a very bad
 idea that will open us to race conditions/symlink attacks etc.? Probably
 better than setting it to `/tmp/`.

 It's better than `/tmp` but not by much.  I would rather standalone
 servers failed to start without a user provided state directory, mostly so
 it doesn't put it's state in surpising locations when invoked from
 incorrect init scripts etc.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10887#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list