[tor-dev] Another key exchange algorithm for extending circuits: alternative to ntor?
Robert Ransom
rransom.8774 at gmail.com
Fri Aug 10 21:53:11 UTC 2012
On 8/8/12, Nick Mathewson <nickm at freehaven.net> wrote:
> http://www.infsec.cs.uni-saarland.de/~mohammadi/owake.html
Also, where does this paper specify that the participants must check
that public-key group elements are not equal to the identity element?
That's rather important, as Tor's relay protocol is likely to break if
an attacker can force a server to open additional circuits to an
attacker using the same key material that a legitimate client's
circuit has.
Robert Ransom
More information about the tor-dev
mailing list