[tor-dev] [Discussion] 5 ^H 3 hops rendezvous circuit design
str4d
str4d at i2pmail.org
Fri Feb 14 11:37:22 UTC 2014
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
On 02/13/2014 11:43 AM, Zack Weinberg wrote:
> (Four hops is what I2P uses, with two chosen entirely by the client
> and two entirely by the server; but there appears to be nothing to
> guarantee that a malicious peer can't connect directly to its
> counterparty's two-hop chain, sacrificing some of its own anonymity
> but getting closerfor a while now to the counterparty. I did just
> argue that that shouldn't matter, though...)
Just FTR, since 0.9.7.1 I2P defaults to 3 hops for "client" tunnels
(so default of 6 hops end-to-end, and 12 hops round-trip). And yes,
there is nothing stopping a malicious peer building zero-hop tunnels
(acting as its own Outbound Endpoint/Inbound Gateway), just as honest
clients or servers can choose to use zero-hop tunnels (e.g. a website
or IRC network that requires no anonymity of its own, but wants its
users to benefit).
str4d
>
> zw
>
>
>
> _______________________________________________ tor-dev mailing
> list tor-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
iQEcBAEBCgAGBQJS/f/RAAoJENXeOJaUpGWyUB8H/RI45Bc7TXc7y2SN0Tj1Sabz
Wwjqb4tb4fhcFV7C6biJEFg6sKR1GPnNAa6AsadoMREJ/KD64t9eoii1g38x/UdN
GxwHLk/h7zJCTRxMR0W89S7nIGimzp/I12urLXwYvvIoKjbytX1a9e3TkZpBmOvS
D1JvAhVeoMa2dUfjT4jZH83kGQ3PlWvYPOvyv5CiSgoE6KHXWn2pYfNiOQF8mzWU
oDU0TaNMsATjX/y1bwPAdf6w+DoKOw2xmpVyutY5+CYRC9BrvqAyV5WWwVvOTZHz
gTIYVToLGN79PBsMDT0nJoxvm58a734qR9XANo5fDegkJIWKY+Ac/cBwadq25A0=
=1wAz
-----END PGP SIGNATURE-----
More information about the tor-dev
mailing list