diff options
author | Roger Dingledine <arma@torproject.org> | 2003-11-04 07:18:16 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2003-11-04 07:18:16 +0000 |
commit | ad0e3d02fe71e499eb7bf8a76d0651b6139b65af (patch) | |
tree | 67768469cbcc22b6ab3e825f17326a7f13ff8a39 /doc | |
parent | bcbb0bc0d50bc83e8a5cbdd8172d12191abcfbca (diff) | |
download | tor-ad0e3d02fe71e499eb7bf8a76d0651b6139b65af.tar.gz tor-ad0e3d02fe71e499eb7bf8a76d0651b6139b65af.zip |
compress 'compromise keys'
svn:r748
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor-design.tex | 35 |
1 files changed, 10 insertions, 25 deletions
diff --git a/doc/tor-design.tex b/doc/tor-design.tex index a84491dcb2..8274903600 100644 --- a/doc/tor-design.tex +++ b/doc/tor-design.tex @@ -1455,31 +1455,16 @@ current evidence of their practicality.} \subsubsection*{Active attacks} -\emph{Compromise keys.} -If a TLS session key is compromised, an attacker -can view all the cells on TLS connection until the key is -renegotiated. (These cells are themselves encrypted.) If a TLS -private key is compromised, the attacker can fool others into -thinking that he is the affected OR, but still cannot accept any -connections. \\ -If a circuit session key is compromised, the -attacker can unwrap a single layer of encryption from the relay -cells traveling along that circuit. (Only nodes on the circuit can -see these cells.) If an onion private key is compromised, the attacker -can impersonate the OR in circuits, but only if the attacker has -also compromised the OR's TLS private key, or is running the -previous OR in the circuit. (This compromise affects newly created -circuits, but because of perfect forward secrecy, the attacker -cannot hijack old circuits without compromising their session keys.) -In any case, periodic key rotation limits the window of opportunity -for compromising these keys. \\ -Only by -compromising a node's identity key can an attacker replace that -node indefinitely, by sending new forged descriptors to the -directory servers. Finally, an attacker who can compromise a -directory server's identity key can influence every client's view -of the network---but only to the degree made possible by gaining a -vote with the rest of the the directory servers. +\emph{Compromise keys.} An attacker who learns the TLS session key can see +the (still encrypted) relay cells on that circuit; learning the circuit +session key lets him unwrap one layer of the encryption. An attacker +who learns an OR's TLS private key can impersonate that OR, but he must +also learn the onion key to decrypt \emph{create} cells (and because of +perfect forward secrecy, he cannot hijack already established circuits +without also compromising their session keys). Periodic key rotation +limits the window of opportunity for these attacks. On the other hand, +an attacker who learns a node's identity key can replace that node +indefinitely by sending new forged descriptors to the directory servers. \emph{Iterated compromise.} A roving adversary who can compromise ORs (by system intrusion, legal coersion, or extralegal |