#26294: attacker can force intro point rotation by ddos -------------------------------------------------+------------------------- Reporter: arma | Owner: asn Type: defect | Status: | assigned Priority: Medium | Milestone: Tor: | unspecified Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: tor-hs, tor-dos, network-team- | Actual Points: roadmap-2019-Q1Q2 | Parent ID: #29999 | Points: 7 Reviewer: | Sponsor: | Sponsor27-must -------------------------------------------------+-------------------------
Comment (by asn): Replying to [comment:13 cypherbits]: > On the other hand I have two questions on the implementation and replay caches: > > -How does the replay cache works for INTRODUCE1 cells? The bug allowing for the same circuit to send many INTRODUCE1 should be closed years ago. > > -Why we actually rotate Introduction Points? and why we do it after x INTRODUCE cells and not based on a time, like each 24 hours? Hello, this is not a discussion forum. Please use the mailing list for such discussions. Please see comment:8 for more info on the replay cache. And yes, the plan with this ticket is to only rorate intro points based on time, and not based on number of introductions (see comment:8 again). -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26294#comment:14> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs