Opened 15 months ago

Last modified 15 months ago

#25308 reopened enhancement

Onion service node pinning by default

Reported by: cypherpunks Owned by:
Priority: Medium Milestone: Tor: unspecified
Component: Core Tor/Tor Version:
Severity: Normal Keywords: tor-hs
Cc: adrelanos@… Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

Hi, can you please consider enabling node pinning by default for onion services? https://trac.torproject.org/projects/tor/ticket/13837

If you plan on waiting for more testing, is there a fingerprinting disadvantage if some users have it enabled?

Child Tickets

Change History (4)

comment:1 Changed 15 months ago by cypherpunks

Resolution: duplicate
Status: newclosed

If you plan on waiting for more testing, is there a fingerprinting disadvantage if some users have it enabled?

IFIRC, and AFAIK, that's why it's not enabled by default until that problem is fixed, i.e. when the rest of the padding negotiation proposal is implemented: http://jqs44zhtxl2uo6gk.onion/torspec.git/tree/proposals/254-padding-negotiation.txt

comment:2 Changed 15 months ago by adrelanos

Cc: adrelanos@… added
Component: - Select a componentCore Tor
Resolution: duplicate
Status: closedreopened

comment:3 Changed 15 months ago by asn

We are consdering doing this but it's a lot of work. It's basically proposal 247 but it needs lots of work to make it work well if the whole network uses it.

I can't think of a great fingerprinting danger if only a few people have node pinning enabled. The guard can figure this out, but if the attacker is your guard then you are fucked anyway. The pinned nodes can also figure it out, but I guess you are pinning them because you trust them. A local area adversary should not be able to distinguish something significant. Please correct me if I'm wrong

comment:4 Changed 15 months ago by dgoulet

Component: Core TorCore Tor/Tor
Keywords: tor-hs added
Milestone: Tor: unspecified
Note: See TracTickets for help on using tickets.