aboutsummaryrefslogtreecommitdiff
path: root/changes
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2014-05-06 20:40:40 -0400
committerNick Mathewson <nickm@torproject.org>2014-05-06 20:40:40 -0400
commit5cea500ce75116abe4deb46d759f5ac1048dd4cc (patch)
tree4fcdffd80c17c0e322e0c7e40bedbbcb71b32e99 /changes
parented0e2ecaa797696b88a388e4f82091d6aa7461a6 (diff)
parent52416f8cfb8bc28207c05d83f50ed878ae358998 (diff)
downloadtor-5cea500ce75116abe4deb46d759f5ac1048dd4cc.tar
tor-5cea500ce75116abe4deb46d759f5ac1048dd4cc.tar.gz
Merge branch 'bug11743_option_b'
Diffstat (limited to 'changes')
-rw-r--r--changes/bug1174315
1 files changed, 15 insertions, 0 deletions
diff --git a/changes/bug11743 b/changes/bug11743
new file mode 100644
index 000000000..89e4bbc2b
--- /dev/null
+++ b/changes/bug11743
@@ -0,0 +1,15 @@
+ o Major security fixes (directory authorities):
+
+ - Directory authorities now include a digest of each relay's
+ identity key as a part of its microdescriptor.
+
+ This is a workaround for bug #11743, where Tor clients do not
+ support receiving multiple microdescriptors with the same SHA256
+ digest in the same consensus. When clients receive a consensus
+ like this, they only use one of the relays. Without this fix, a
+ hostile relay could selectively disable client use of target
+ relays by constucting a router descriptor with a different
+ identity and the same microdescriptor parameters and getting the
+ authorities to list it in a microdescriptor consensus. This fix
+ prevents an attacker from causing a microdescriptor collision,
+ because the router's identity is not forgeable.