[tor-bugs] #23101 [Core Tor/Tor]: Predict and build specific HS purpose circuits (rather than GENERAL)
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Jan 18 03:10:08 UTC 2018
#23101: Predict and build specific HS purpose circuits (rather than GENERAL)
-------------------------------------------------+-------------------------
Reporter: mikeperry | Owner:
| mikeperry
Type: enhancement | Status:
| merge_ready
Priority: Medium | Milestone: Tor:
| 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-hs, tor-guard, guard-discovery- | Actual Points:
prop247-controller, review-group-27, review- |
group-30 |
Parent ID: #13837 | Points:
Reviewer: asn | Sponsor:
-------------------------------------------------+-------------------------
Comment (by teor):
Replying to [comment:27 arma]:
> Replying to [comment:26 teor]:
> > ...
> > But maybe it is better to always do vanguards for internal circuits.
Do we know if the onion service attacks apply to other circuits?
>
> A good question. Is there some revised vanguard design proposal at this
point? :) It would seem that at least service-side publishing doesn't
happen that often, and more importantly doesn't happen in response to
adversary action, so it wouldn't benefit as much from the vanguard
approach.
Let's not assume this.
If an adversary can cause an onion service to repeatedly crash or run out
of RAM, then service uploads happen in response to that adversary action.
Also, in a non-traditional application like OnionFlare, an adversary could
deliberately register sites that use adversarial HSDirs.
Or if Ricochet ever used client authentication, a new friend request could
result in a new client key and a descriptor upload.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23101#comment:28>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list