aboutsummaryrefslogtreecommitdiff
path: root/proposals/179-TLS-cert-and-parameter-normalization.txt
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2012-03-06 18:04:04 -0500
committerNick Mathewson <nickm@torproject.org>2012-03-09 12:05:26 -0500
commit28a78381e4cee7d9fe20415d5c2d1391510a87f8 (patch)
tree4025ec64f905922456b7e7902450e6c21acdba70 /proposals/179-TLS-cert-and-parameter-normalization.txt
parentafcbbacedfddfbb8520a44003c6b81f6aee8743a (diff)
downloadtorspec-28a78381e4cee7d9fe20415d5c2d1391510a87f8.tar.gz
torspec-28a78381e4cee7d9fe20415d5c2d1391510a87f8.zip
Draft-status proposal 195: normalize TLS in 0.2.4
Diffstat (limited to 'proposals/179-TLS-cert-and-parameter-normalization.txt')
-rw-r--r--proposals/179-TLS-cert-and-parameter-normalization.txt27
1 files changed, 26 insertions, 1 deletions
diff --git a/proposals/179-TLS-cert-and-parameter-normalization.txt b/proposals/179-TLS-cert-and-parameter-normalization.txt
index 7ad3ed8..4272d4f 100644
--- a/proposals/179-TLS-cert-and-parameter-normalization.txt
+++ b/proposals/179-TLS-cert-and-parameter-normalization.txt
@@ -2,7 +2,7 @@ Filename: 179-TLS-cert-and-parameter-normalization.txt
Title: TLS certificate and parameter normalization
Author: Jacob Appelbaum, Gladys Shufflebottom
Created: 16-Feb-2011
-Status: Draft
+Status: Closed
Target: 0.2.3.x
@@ -11,6 +11,12 @@ Target: 0.2.3.x
Overview
+ STATUS NOTE:
+
+ This document is implemented in part in 0.2.3.x, deferred in part, and
+ rejected in part. See indented bracketed comments in individual
+ sections below for more information. -NM
+
Scope
This is a document that proposes improvements to problems with Tor's
@@ -135,6 +141,11 @@ covert channel will not lead to an attacker having a method to downgrade client
behavior. This shouldn't be a risk because the TLS Finished message hashes over
all the bytes of the handshake, including the certificates.
+ [Randomized serial numbers are implemented in 0.2.3.9-alpha. We probably
+ shouldn't do certificate tagging by a covert channel in serial numbers,
+ since doing so would mean we could never have an externally signed
+ cert. -NM]
+
Certificate fingerprinting issues expressed as base64 encoding
It appears that all deployed Tor certificates have the following strings in
@@ -209,6 +220,8 @@ The expiration time should not be a fixed time that is simple to calculate by
any Deep Packet Inspection device or it will become a new Tor TLS setup
fingerprint.
+ [Deferred and needs revision; see proposal XXX. -NM]
+
Proposed certificate form
The following output from openssl asn1parse results from the proposed
@@ -260,6 +273,10 @@ default self-signed certificate:
383:d=2 hl=2 l= 0 prim: NULL
385:d=1 hl=3 l= 129 prim: BIT STRING
+ [Rejected pending more evidence; this pattern is trivially detectable,
+ and there is just not enough reason at the moment to think that this
+ particular certificate pattern is common enough for sites that matter
+ that the censors wouldn't be willing to block it. -NM]
Custom Certificates
@@ -271,6 +288,8 @@ This may be desirable in some kinds of filtered networks or when attempting to
avoid attracting suspicion by blending in with the TLS web server certificate
crowd.
+ [Deferred; see proposal XXX]
+
Problematic Diffie–Hellman parameters
We currently send a static Diffie–Hellman parameter, prime p (or “prime p
@@ -317,6 +336,8 @@ well for Tor. More research in this area including the applicability of
Miller-Rabin or AKS primality tests[6] will need to be analyzed and probably
added to Tor.
+ [Randomized DH groups are implemented in 0.2.3.9-alpha. -NM]
+
Practical key size
Currently we use a 1024 bit long RSA modulus. I propose that we increase the
@@ -327,6 +348,10 @@ with regard to key security properties.
The implementer should increase the 1024 bit RSA modulus to 2048 bits.
+ [Deferred and needs performance analysis. See proposal
+ XXX. Additionally, DH group strength seems far more crucial. Still, this
+ is out-of-scope for a "normalization" question. -NM]
+
Possible future filtering nightmares
At some point it may cost effective or politically feasible for a network