Tor relay security

Jan Reister Jan.Reister at unimi.it
Wed Feb 3 14:10:19 UTC 2010


Il 03/02/2010 13:59, onion.soup at nym.hush.com ha scritto:
> 1. The article talks about encrypting sensitive information on a 
> Tor server. Does the author mean that files on hard disk are 
> obtainable by other Tor users when I run a Tor relay?

No, unless a new vulnerability is discovered in Tor.

> 2. I noticed there are key files found on machines running as Tor 
> relays. 

An attacker that got your relay's key files after a compromise could
impersonate it in the Tor network. This is why it's advisable encrypting
a relay's drive.

Jan
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list