Changes between Version 197 and Version 198 of doc/FAQUnanswered


Ignore:
Timestamp:
Apr 23, 2010, 10:49:25 AM (9 years ago)
Author:
trac
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • doc/FAQUnanswered

    v197 v198  
    88= Unanswered FAQ Questions =
    99
    10 1) '''Why do I keep getting messages telling me that my clock has just jumped ahead and that my circuits will be assumed broken? ''(eg.
     101) '''Hidden services are currently very vulnerable to attacks by web hosts who come to suspect a machine in their network is being used for Tor. Since they can power cycle the server in question (and likely blame it on technical difficulties without arousing suspicion) they can make an unambiguous identification of a hidden service host.
     11This could be prevented if the directory servers supported more than one provider for a hidden service and so could direct requests away from a non-responsive server (there may be other solutions). Of course this could also help provide more reliable hidden services in general. Is there any chance of this getting implemented in the near future?'''
     12
     132) '''Why do I keep getting messages telling me that my clock has just jumped ahead and that my circuits will be assumed broken? ''(eg.
    1114Oct 02 10:14:53.619 [notice] Your clock just jumped 1056 seconds forward; assuming established circuits no longer work.'') I've got a cron job to sync the time every eight hours and it's never out by more than a second.'''
    1215
     
    1417
    1518
    16 2)'''If an attacker has access to past logs of ISP and any given visted site, does the prng of the tor client allow the attacker to guess which circuit it used next?'''
     193)'''If an attacker has access to past logs of ISP and any given visted site, does the prng of the tor client allow the attacker to guess which circuit it used next?'''
    1720
    1821Tor uses cryptographically strong random numbers provided by OpenSSL when choosing nodes to use in a circuit. How OpenSSL implements this is operating system specific. If there's a weakness in Tor's method of choosing nodes, it probably isn't in the random number generator.