[tor-relays] 90% of exits vulnerable to TCP off-path attack
dawuud
dawuud at riseup.net
Fri Aug 12 16:15:57 UTC 2016
Indeed! Perhaps we can extend the research paper's (the actual paper not that silly article)
4-tuple inference to infer tor connections for a given relay without knowledge of the connecting
relay's IP address by extending the permutation space using the current tor relay consensus.
On Fri, Aug 12, 2016 at 11:52:55AM -0400, starlight.2016q3 at binnacle.cx wrote:
> [one last time, no DKIM for Tor lists nevermore]
>
> RFC-5961
>
> CVE-2016-5696
>
> http://www.theregister.co.uk/2016/08/10/linux_tor_users_open_corrupted_communications/
>
> FYI all
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160812/6fde16ec/attachment.sig>
More information about the tor-relays
mailing list