On 12 Jan 2017, at 20:49, bancfc at openmailbox.org wrote:
> Hi Steven and Fernando,
>> I am a Whonix (anonymity OS) dev and would like to discuss the RFC
> 6528 [0] you worked on. There has been privacy research in the area of
> timer and clock leaks in network protocols that can aid adversaries in
> deanonymizing Tor clients and hidden services. There is a practical
> attack where an adversary can skew timer measurements by overloading
> target machines and affect the oscillation of timer crystals in
> predictable patterns that can be remotely measured in TCP sequence
> numbers.[1]
>> Please consider revising the RFC to omit the requirement of xoring
> timer output with TCP ISNs. Recently the Linux kernel gained the
> SipHash PRF to generate better sequence numbers and deprecated MD5.
> This further reduces the necessity of including timer input which has
> become a side channel that aids traffic correlation and endangers
> privacy focused use cases.
I'm a bit confused -- there's no requirement in 6528 for XORing a timer.
That plus sign in the equation at the start of Section 3 signifies
addition (modulo 2^32, I should mention, since it's a 32-bit field), not
exclusive-OR. I'd have to think about it, but I'm not at all convinced
that XOR would even work in that context. The result of the actually
specified operation is that the ISN of a given connection is uniformly
randomly distributed in [0,2^32-1] and independent of the ISN of any
other connection.
I'm still reading [2], but I don't see the relevance of the attack to
Tor. Tor does not provide end-to-end TCP; rather, it provides
end-to-end transport of the TCP payload, correct? In that case, the
sequence numbers of the sender are only visible as far as its Tor
entrance node, but they're useless for an attack -- anyone who observes
those sequence numbers already has the source IP address; there's no
added value, unless the threat is some machine whose source IP address
is changing rapidly. But if that's your threat model, you can look at
the TCP PAWS timer. Beyond that, though [2] notes that subtracting two
ISN will give you the timer difference, that's only true if you subtract
two ISNs for the same connection -- and that's very hard in this
context. The source port will change constantly, with each new TCP
open, and while you can manage the same connection when calling a
server, with a Tor hidden service the server is actually a client at the
TCP level, so it picks its own port numbers.
I'm unfamiliar with what Linux has done to get away from RFC 1948/6528.
Simply replacing MD5 with SipHash does not do away with the need for the
timer. The whole purpose of the timer is to preserve TCP connection
integrity semantics; omitting it changes those semantics. Preserving
them was the whole point of 1948, or I'd have suggesting simply using a
good PRNG for ISNs in my 1989 paper. Do you have a pointer to any
documentation describing what's done?
Anyway -- at the moment, I don't see an attack. As best I can tell, [2]
describes a way to leak data via the ISN without risk of detection (and
I'm not even convinced that the threat of detection is real for a Tor
hidden service, given the client port number issue). That's not the
same as being able to fingerprint a timer in a real Tor situation. Even
if it was, Tor does not relay TCP headers, so they're not visible past
the first Tor hop.
Mind you, I'm not saying you're wrong. I am saying that you haven't
persuaded me that you're right or that your suggestion preserves TCP
semantics for non-Tor situations.
> [0] https://tools.ietf.org/html/rfc6528
> [1] http://sec.cs.ucl.ac.uk/users/smurdoch/papers/ccs06hotornot.pdf
> [2] http://sec.cs.ucl.ac.uk/users/smurdoch/papers/ih05coverttcp.pdf
--Steve Bellovin, https://www.cs.columbia.edu/~smb
More information about the Whonix-devel
mailing list
“Look here!” Dick began to chuckle. “We’ve got a queer combination to work with—our Sky Patrol has! Suspicious Sandy—and—Superstitious Jeff!” Sandy grinned ruefully, a little sheepishly. Larry smiled and shook his head, warning Dick not to carry his sarcasm any further, as Jeff frowned. 52 "You do doubt me. If you did not, it would never occur to you to deny it. You doubt me now, and you will doubt me still more if you don't read it. In justice to me you must." "That same. She was part Mescalero, anyway." This Act, as disgraceful as any which ever dishonoured the statute-book in the reigns of the Tudors or Stuarts, was introduced into the Commons, on the 12th of May, by Sir William Wyndham, and was resolutely opposed by the Whigs, amongst whom Sir Peter King, Sir Joseph Jekyll, Mr. Hampden, Robert Walpole, and General Stanhope distinguished themselves. They did not convince the majority, which amounted to no less than two hundred and thirty-seven to one hundred and twenty-six. In the Lords, Bolingbroke himself moved the second reading, and it was ably opposed by the Lords Cowper, Wharton, Halifax, Townshend, Nottingham, and others. The greatest curiosity was displayed regarding the part which Oxford would take, as it was known that in the Council he had endeavoured to soften the rigorous clauses; but in the House he followed his usual shuffling habit, declaring that he had not yet considered the question; and, having induced the Opposition to let the second reading pass without a division, he absented himself from the final voting, and thus disgusted both parties and hastened his own fall. The battle of Falkirk, which in itself appeared so brilliant an affair for Prince Charles, was really one of his most serious disasters. The Highlanders, according to their regular custom when loaded with plunder, went off in great numbers to their homes with their booty. His chief officers became furious against each other in discussing their respective merits in the battle. Lord George Murray, who had himself behaved most bravely in the field, complained that Lord John Drummond had not exerted himself, or pursuit might have been made and the royal army been utterly annihilated. This spirit of discontent was greatly aggravated by the siege of the castle of Stirling. Old General Blakeney, who commanded the garrison, declared he would hold out to the last man, in spite of the terrible threats of Lord George Murray if he did not surrender. The Highlanders grew disgusted with work so contrary to their habits; and, indeed, the French engineer, the so-called Marquis de Mirabelle, was so utterly ignorant of his profession, that the batteries which he constructed were commanded by the castle, and the men were so much exposed that they were in danger of being destroyed before they took the fortress. Accordingly, on the 24th of January they struck to a man, and refused to go any more into the trenches. "Haint we bit off more'n we kin chaw. Shorty?" asked Si, as he looked over the increasing gang. "Hadn't we better ask for some help?" "How far would it carry?" Corpril, Company Q, 2 Hundsrdth Injiamiy Volintear "He d?an't care much. F?ather, he likes to be comfortable, and this Inclosure w?an't make much difference to that. 'T?un't as if we wanted the pasture badly, and F?ather he d?an't care about land." "Byles," interrupted Calverley, speaking rapidly, "you are poor—you are in arrear with your rent; a distress will be levied, and then what will become of you—of your wife and the little one? Listen to me! I will give you money to keep a house over your head; and when I am steward, you shall have the first farm at my lord's disposal, if you will only aid me in my revenge! Revenge!" he repeated, vehemently—"but you hesitate—you refuse." "Yes, yes, there is little doubt of that: but how can we come at the truth? Sudbury still retains his wrath against us, and would oppose an arrest; and even could he be waylaid, and brought hither, he is stubborn, and might refuse to answer." HoME一级做人爱c视正版免费
ENTER NUMBET 0017 gezi1.com.cn sanxi8.net.cn www.xuwan0.net.cn www.opjy.com.cn duchi7.net.cn www.danti2.com.cn nayao6.com.cn hehua4.com.cn www.szglyl.com.cn www.arttoto.com.cn