Trac: Description: We should do what proposal 224 section 4.3 says and pad legacy rend cells to 168 bytes so that they all look the same .
to
We should do what proposal 224 section 4.3 says and pad rend cells to 168 bytes so that they all look the same. Summary: prop224: Pad legacy rendezvous cells to match v3 cells to prop224: Pad RENDEZVOUS1 cell to match legacy cell length
Ian pointed out that just padding with random bytes is not the right approach since the g^y field of the legacy cell has certain algebraic structure that will be missing from the random pad. We could in theory add intelligent padding that matches the algebraic structure, but kinda overkill perhaps.
teor pointed out that there are other distinguishers between v2 and v3, like whether the service extends with tap vs ntor.
We could do naive padding in v3, but only with the hope that it would obfuscate future cells (v4, etc.).
Based on the above I have no strong opinions here, and I'm fine with either doing nothing, or doing naive padding.
So, IIUC, the "algebraic structure" in question here is just that real values of g^y^ will always be between 2 and p-1 (inclusive). But since p is very close to 2^1024^, nearly all values will pass that test. (Random junk will fail with probability approximately 2^-66^.)
The tap/ntor argument is stronger.
On the other hand, just padding with random bytes costs us almost nothing.
WRT the tap/ntor argument, Roger mentioned that even legacy onion services should extend using ntor these days, since ntor has been around since 0.2.4 or so.
There might be some legacy services that still use tap, but probably not many.
The padding is very cheap to do although I think the current code takes the raw bytes from our PRNG so we might not want to expose that to the RP directly? The crypto_strongest_rand() is the one hashing the bytes but could be heavier?
Considering the padding will in most cases pass the test, seems a win-win to just do it.
Don't use crypto_strongest_rand() unless you need an extra hash bytes straight from the operating system.
Personally, I believe that the "don't expose PRNG bytes to the world" wisdom is bad, but if you want to avoid it, pass 32 bytes of crypto_rand() output through SHAKE?