summaryrefslogtreecommitdiff
path: root/doc/spec
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2007-12-02 13:51:16 +0000
committerRoger Dingledine <arma@torproject.org>2007-12-02 13:51:16 +0000
commit25a43314d1e4133b8d0a9de833802929e606ab7f (patch)
treeac2871238f8d78bba3e09925c49b7eda392cbf85 /doc/spec
parent07dbaaac16ed63b031af61db6d7ba0499c47bba4 (diff)
downloadtor-25a43314d1e4133b8d0a9de833802929e606ab7f.tar.gz
tor-25a43314d1e4133b8d0a9de833802929e606ab7f.zip
another attack on bridges. darn it.
svn:r12639
Diffstat (limited to 'doc/spec')
-rw-r--r--doc/spec/proposals/125-bridges.txt17
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/spec/proposals/125-bridges.txt b/doc/spec/proposals/125-bridges.txt
index 3b96ecd9d5..1a3f6c5685 100644
--- a/doc/spec/proposals/125-bridges.txt
+++ b/doc/spec/proposals/125-bridges.txt
@@ -329,3 +329,20 @@ Status: Open
Once proposal 124 (modified TLS handshake) is in place, we should
consider doing the switch. This might even be in the 0.2.0.x timeframe.
+3.8. Do we need a second layer of entry guards?
+
+ If the bridge user uses the bridge as its entry guard, then the
+ triangulation attacks from Lasse and Paul's Oakland paper work to
+ locate the user's bridge(s).
+
+ Worse, this is another way to enumerate bridges: if the bridge users
+ keep rotating through second hops, then if you run a few fast servers
+ (and avoid getting considered an Exit or a Guard) you'll quickly get
+ a list of the bridges in active use.
+
+ That's probably the strongest reason why bridge users will need to
+ pick second-layer guards. Would this mean bridge users should switch
+ to four-hop circuits?
+
+ We should figure this out in the 0.2.1.x timeframe.
+