diff options
author | Nick Mathewson <nickm@torproject.org> | 2011-09-09 12:53:45 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2011-09-09 12:53:45 -0400 |
commit | 4467799f45346a59c37de9337b24ace361cb8b6a (patch) | |
tree | 9323626d194ba145dda04e2e06c5f2004b06d3d1 /changes/replay-firstpart | |
parent | dfa6cde4d4de57476ea8381199dfbac1afc245d5 (diff) | |
parent | cb9226bcdb811c6b30fb4bb2b6b06b378ebf0559 (diff) | |
download | tor-4467799f45346a59c37de9337b24ace361cb8b6a.tar tor-4467799f45346a59c37de9337b24ace361cb8b6a.tar.gz |
Merge remote-tracking branch 'public/enhance_replay_detection' into maint-0.2.2
Diffstat (limited to 'changes/replay-firstpart')
-rw-r--r-- | changes/replay-firstpart | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/changes/replay-firstpart b/changes/replay-firstpart new file mode 100644 index 000000000..f4a7767fb --- /dev/null +++ b/changes/replay-firstpart @@ -0,0 +1,13 @@ + o Minor features (security): + + - Check for replays of the public-key encrypted portion of an + INTRODUCE1 cell, in addition to the current check for replays of + the g^x value. This prevents a possible class of active attacks + by an attacker who controls both an introduction point and a + rendezvous point, and who uses the malleability of AES-CTR to + alter the encrypted g^x portion of the INTRODUCE1 cell. We + think that these attacks is infeasible (requiring the attacker + to send on the order of zettabytes of altered cells in a short + interval), but we'd rather block them off in case there are any + classes of this attack that we missed. Reported by dvorak. + |