We need to write a proposal to determine the best way to provide authentication to our circuit crypto, so that cells that have been tagged/tampered with/duplicated cause circuit failure at the 2nd hop, not the third.
As I understand it, there are two competing possibilities:
The main disadvantage of 1 is that it's likely slow and not very many people use it. The disadvantage of 2 is that it requires us to disclose path length count and position to nodes, as well as have MACs that either grow with increased path length, or become less secure with increased path length.
There are probably other issues. I believe the current plan is to produce both options in one or more proposals and compare and contrast them.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
We need to write a proposal to determine the best way to provide authentication to our circuit crypto, so that cells that have been tagged/tampered with/duplicated cause circuit failure at the 2nd hop, not the third.
The goal is to ensure that any attempt to tag a circuit destroys all further data sent on it, so that the attacker cannot tag a circuit's data in any way other than by destroying it. (These anti-tagging measures do nothing about timing-based ‘tagging’ techniques; they are motivated by the assumption that tagging a circuit's data is much easier or more effective than any timing attack.)
As I understand it, there are two competing possibilities:
BEAR/LION/LIONESS are not ‘self-authenticating crypto’. They are large-block block ciphers which ensure that any change to a block's data on one side of an honest relay completely scrambles the block's data on the other side. They would need to be accompanied by an end-to-end MAC.
Per-hop MAC
The main disadvantage of 1 is that it's likely slow and not very many people use it.
LION can be made relatively fast (certainly faster than Tor's current crypto) by using an appropriate stream cipher and message-digest function in it. (Per-hop MACs can be made faster, but LION isn't slow.)
The disadvantage of 2 is that it requires us to disclose path length count and position to nodes, as well as have MACs that either grow with increased path length, or become less secure with increased path length.
These disadvantages are not required. Nick proposed these ideas because they may allow better security-versus-MAC-size tradeoffs.
There are probably other issues. I believe the current plan is to produce both options in one or more proposals and compare and contrast them.
I'm taking assignment on this, since i already started in the latter part of xxx-new-crypto-ops.txt. I'm going to split that into one or two "here's how the circuit protocol would work" things.
We can figure out the relative advantages and disadvantages of both designs once we have the proposals, I think. I'll also try to write up the #tor-dev IRC discussion we had about them about their relative impacts on cell tagging.
Ondrej pointed out that I2P's one-RTT circuit construction is very useful for avoiding disclosing the length of your circuit. It might also be useful for avoiding the per-hop MACs we'd need here.
BEAR/LION/LIONESS are not ‘self-authenticating crypto’. They are large-block block ciphers which ensure that any change to a block's data on one side of an honest relay completely scrambles the block's data on the other side. They would need to be accompanied by an end-to-end MAC.
Even if accompanied by an end-to-end mac, isn't that insufficient? If I can mangle a cell, and detect mangling, and it still gets to the other end, that sounds like a tagging attack to me. It's not as fine-grained a tagging attack sure, but if the goal is "cause circuit failure at the 2nd hop, not the third" then it's not going to do it, right?
Ondrej pointed out that I2P's one-RTT circuit construction is very useful for avoiding disclosing the length of your circuit. It might also be useful for avoiding the per-hop MACs we'd need here.
BEAR/LION/LIONESS are not ‘self-authenticating crypto’. They are large-block block ciphers which ensure that any change to a block's data on one side of an honest relay completely scrambles the block's data on the other side. They would need to be accompanied by an end-to-end MAC.
Even if accompanied by an end-to-end mac, isn't that insufficient? If I can mangle a cell, and detect mangling, and it still gets to the other end, that sounds like a tagging attack to me. It's not as fine-grained a tagging attack sure, but if the goal is "cause circuit failure at the 2nd hop, not the third" then it's not going to do it, right?
"It Depends". The biggest problem with the current tagging attack is that a successfully tagged circuit (one where the attacker observes the tag) is recoverable by the attacker. Either a whole-cell encryption approach or a per-hop MAC approach would solve that. (As for the "it's still a tag" argument... it's not clear that "the whole circuit gets destroyed away suddenly" is much worse as a tag than "the whole circuit turns to junk suddenly.)
I wrote a draft draft draft today, and I'm showing it to as some naive-about-tor/smart-about-crypto people to try to make sure it's readable. I'll give it another editing pass after that, assign it a proposal number, and call this ticket closed.
Ondrej pointed out that I2P's one-RTT circuit construction is very useful for avoiding disclosing the length of your circuit. It might also be useful for avoiding the per-hop MACs we'd need here.
Mike, Marsh, and I just discussed this a little on IRC. The tricky thing here is that there aren't a lot of ways to do one-RTT circuit construction and retain PFS--especially PFS for your path itself!-- unless you're getting your PFS from key rotation.
We should go through Kate and Goldberg's paper to see if it shows (or cites!) something we could use, but it's not obvious to me that it's a great idea right now.
(Also, circuit creation is not what this ticket is about: this ticket is about handling relay cells once circuits are established.)
Hope is on the way, perhaps: DJB and Rogaway both tell me that AEZ is probably fast enough and secure enough. (Especially if we're willing to depend on AESNI.) DJB says that he's got a more generic construction in the works that doesn't rely on the AES round function, and if that's done soon enough, we can consider that one too.
Trac: Cc: nickm, rransom to nickm, rransom, yawning