[tor-bugs] #8244 [Tor]: The HSDirs for a hidden service should not be predictable indefinitely into the future
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Jun 24 23:01:03 UTC 2015
#8244: The HSDirs for a hidden service should not be predictable indefinitely into
the future
-------------------------+-------------------------------------------------
Reporter: arma | Owner:
Type: | Status: assigned
enhancement | Milestone: Tor: 0.2.???
Priority: normal | Version:
Component: Tor | Keywords: tor-hs, needs-proposal,
Resolution: | 026-triaged-1, 027-triaged-1-out
Actual Points: | Parent ID: #12424
Points: |
-------------------------+-------------------------------------------------
Comment (by kernelcorn):
There is an estimation of the consensus in my OnioNS paper. My analysis
found ~8.9 kilobits of entropy based on routers that change some selected
fields in their descriptors, and 16kb - 28kb of entropy based on routers
entering and leaving the Tor network. Using the consensus (at least
cached-microdesc and cached-certs) as a global source of entropy appears
to be a secure idea. It's also trivial to add more entropy. Although not
everyone has the same consensus at the same time, they are timestamped, so
a specific consensus is easy to reference. That's what I'm doing with
OnioNS anyway.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8244#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list