diff options
author | Nick Mathewson <nickm@torproject.org> | 2023-10-14 18:52:20 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2023-10-14 18:53:18 -0400 |
commit | 3457b0720834c8347d8318c1080ebc9486d77300 (patch) | |
tree | b486a3d03fdfae7d98c4e6cf510179cf907c443f /spec/srv-spec/security-analysis.md | |
parent | a331e9f48790ad4beaba1ee443c5ad8b13d3afb4 (diff) | |
download | torspec-3457b0720834c8347d8318c1080ebc9486d77300.tar.gz torspec-3457b0720834c8347d8318c1080ebc9486d77300.zip |
Add short IDs for most long section names
I've left off sections that are headings for their whole document.
Diffstat (limited to 'spec/srv-spec/security-analysis.md')
-rw-r--r-- | spec/srv-spec/security-analysis.md | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/spec/srv-spec/security-analysis.md b/spec/srv-spec/security-analysis.md index a1cc72d..d3346f9 100644 --- a/spec/srv-spec/security-analysis.md +++ b/spec/srv-spec/security-analysis.md @@ -4,7 +4,7 @@ <a id="srv-spec.txt-5.1"></a> -## Security of commit-and-reveal and future directions +## Security of commit-and-reveal and future directions {#sec-commit-and-reveal} The security of commit-and-reveal protocols is well understood, and has certain flaws. Basically, the protocol is insecure to the extent that an @@ -28,7 +28,7 @@ also see the discussion at \[RNGMESSAGING\]. <a id="srv-spec.txt-5.2"></a> -## Predicting the shared random value during reveal phase +## Predicting the shared random value during reveal phase {#sec-predicting} The reveal phase lasts 12 hours, and most authorities will send their reveal value on the first round of the reveal phase. This means that an @@ -44,7 +44,7 @@ be aware of this property. <a id="srv-spec.txt-5.3"></a> -## Partition attacks +## Partition attacks {#sec-partition} This design is not immune to certain partition attacks. We believe they don't offer much gain to an attacker as they are very easy to detect and @@ -56,7 +56,7 @@ and how to detect them. <a id="srv-spec.txt-5.3.1"></a> -### Partition attacks during commit phase +### Partition attacks during commit phase {#sec-partition-commit} A malicious directory authority could send only its commit to one single authority which results in that authority having an extra commit value for @@ -74,7 +74,7 @@ so, this means an attack is ongoing or very bad bug (highly unlikely). <a id="srv-spec.txt-5.3.2"></a> -### Partition attacks during reveal phase +### Partition attacks during reveal phase {#sec-partition-reveal} Let's consider Alice, a malicious directory authority. Alice could wait until the last reveal round, and reveal its value to half of the |