It turns out that if a descriptor contains 10 times the same intro point, and that the first introduction attempt fails, we'll try to connect to the same failing intro point again for all subsequent remaining intro points.
The intro point failure cache was introduced to avoid such a situation but it is only used between two descriptors that is if an intro point failed from the first descriptor and that intro point is still present in the second descriptor fetched, we ignore it.
However, this situation is about the same intro point in the same descriptor. In normal circumstances, this can't happen but it is still allowed by the protocol.
One issue with this is that a malicious service would induce many circuits out of the client than necessary. This can be used, theoretically, for a client guard discovery attack.
This affects both v2 and v3.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
My original suggestion for fixing was that we should consult our failure cache when we're about to launch another try.
But then I realized that maybe we should instead strip duplicate intro points when we process the descriptor.
But then I realized that maybe we should disallow duplicate intro points in the protocol, i.e. say in that spec that you can't do that, and then refuse descriptors that do.
a malicious service would induce many circuits out of the client than necessary. This can be used, theoretically, for a client guard discovery attack.
I think the same level of attack could happen just by listing a bunch of slightly different unreachable intro points. So I don't think we should think of ourselves as fixing a client guard discovery attack at all, when we fix this ticket.
I think the same level of attack could happen just by listing a bunch of slightly different unreachable intro points.
Right. For example, I think it would waste waste just about as much resources if the descriptor were to just list 10 randomly generated nonexistent introduction points.
I noticed teor left some comments on my GitHub PR. Teor, I'm sorry if you're not done reading it.
I made the fixes to the changes file.
Splitting the functions do not make sense as a lot of the code in the functions you suggest should be split depend on goto routines, so it would be harder to split.
I noticed teor left some comments on my GitHub PR. Teor, I'm sorry if you're not done reading it.
I made the fixes to the changes file.
Thanks!
Splitting the functions do not make sense as a lot of the code in the functions you suggest should be split depend on goto routines, so it would be harder to split.
That's fine, I'll leave it to the reviewer to decide if they want to help you split those functions.
@neel: I left one comment there because I think there was a mis-understand with this ticket.
It should be allowed to have more than once the same intro point in the descriptor. What we want is to avoid reconnecting to the same intro points (for the same auth key!) multiple times if that intro point is in the failure cache (for a single descriptor).
First, I believe this is only a v2 problem because in v3, when picking an intro point from the descriptor, we do not pick unusable IPs.
Where with v2, this check is not done when picking the intro point but rather when sending the INTRO cell. Problem lies with rend_client_any_intro_points_usable() I believe because it select a new intro point and only checks at ip->timed_out and not the failure cache.
Once a NACK arrives, the v2 code actually removes the intro point from the parsed descriptor so we can't even check the IP object for an error. We really need to query the failure cache.