[tor-bugs] #27816 [Core Tor/Tor]: Rendezvous failures could distinguish "unknown cookie" from "outdated cookie"
Tor Bug Tracker & Wiki
blackhole at torproject.org
Mon Sep 24 12:26:21 UTC 2018
#27816: Rendezvous failures could distinguish "unknown cookie" from "outdated
cookie"
--------------------------+----------------------------------
Reporter: arma | Owner: (none)
Type: defect | Status: new
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: tor-hs | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------+----------------------------------
Changes (by dgoulet):
* cc: dgoulet (removed)
* keywords: => tor-hs
* milestone: => Tor: unspecified
Comment:
That would require a major refactoring of the rendezvous cookie cache. We
use the `hs_circuitmap` subsystem meaning that we associate cookie ->
circuit ... and thus if the circuit disappears, the cookie follows.
Keeping that cookie alive after the circuit is closed would need us to
have a separate cache where entries would be kept for N minutes. It is
probably closer to 300 lines theory ;).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27816#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list