Hi Holmes, On Fri, Jul 23, 2021 at 05:46:47PM -0400, Holmes Wilson wrote: > Hi everyone, > > A few disjointed questions that have come up recently in our work with Tor: > > 1. PERFORMANCE ON M1 / ARM64 > > We just got a report from a user that the tor binary for Mac was using much > more CPU on Apple Silicon / M1 than it used on Intel. Has anyone scene > anything like this? Is there an arm64 build of tor binary for Mac, existing > or in the works?
Can you provide more detail about where this tor binary came from? Was it compiled from source or did it come from Tor Browser? > > (Related: do Tor developers have a few M1 Macs to test on? We could probably > donate one if not!) > We do not, but we'd be happy to discuss this with you! (I'll leave your other two questions to another tor person) > 2. FORWARD SECRECY > > Is there a good source for documentation on how forward secrecy works in Tor, > and on what security guarantees it provides? Googling finds things like this > reddit post (https://www.reddit.com/r/TOR/comments/cryrjx/does_tor_use_pfs/) > but I can’t find any detailed information about it, what threat models it > fits, etc. > > One specific question is, if two users are communicating by sending messages > over a connection to an onion service (like ricochet) and an attacker > surveils their internet traffic and compromises their devices at a later > date, will the attacker be able to recover the clear text of their > conversation? When are keys for a given connection destroyed? Does it happen > continuously throughout the course of a Tor connection? Or on the creation of > a new circuit? Or what? > > 3. V3 AUTH AND DOS ATTACKS > > Does v3 onion authentication protect against DOS attacks? That is, can > someone who is not authorized to connect to an onion address with > authentication enabled still cause problems for that onion address? Can they > connect to it at all, in the sense of being able to send data to the tor > client at that onion address? Or does the Tor network itself prevent this > connection from even happening? > > A related question is, if we’re looking to deny connections to an onion > address to any unauthorized users, and we’re considering turning off onion > authentication and implementing some standard authentication scheme that > seems fairly well-supported at the web server layer, is there any > security-related reason why we would be better off using Tor’s own > authentication instead? Using our own authentication scheme will be a bit > easier to control, rather than having to send commands to Tor (and possibly > restart it for removing users?) but I’m wondering if there are security > properties we lose by doing that. > > Thanks! > > Also, apologies if any of these questions aren’t clear or well-formed! > > Holmes > > _______________________________________________ > tor-dev mailing list > tor-dev@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev