[tor-bugs] #8244 [Tor]: The HSDirs for a hidden service should not be predictable indefinitely into the future

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jun 24 23:01:03 UTC 2015


#8244: The HSDirs for a hidden service should not be predictable indefinitely into
the future
-------------------------+-------------------------------------------------
     Reporter:  arma     |      Owner:
         Type:           |     Status:  assigned
  enhancement            |  Milestone:  Tor: 0.2.???
     Priority:  normal   |    Version:
    Component:  Tor      |   Keywords:  tor-hs, needs-proposal,
   Resolution:           |  026-triaged-1, 027-triaged-1-out
Actual Points:           |  Parent ID:  #12424
       Points:           |
-------------------------+-------------------------------------------------

Comment (by kernelcorn):

 There is an estimation of the consensus in my OnioNS paper. My analysis
 found ~8.9 kilobits of entropy based on routers that change some selected
 fields in their descriptors, and 16kb - 28kb of entropy based on routers
 entering and leaving the Tor network. Using the consensus (at least
 cached-microdesc and cached-certs) as a global source of entropy appears
 to be a secure idea. It's also trivial to add more entropy. Although not
 everyone has the same consensus at the same time, they are timestamped, so
 a specific consensus is easy to reference. That's what I'm doing with
 OnioNS anyway.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/8244#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list