Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-12-01 Thread Nick Mathewson
On Mon, Nov 7, 2011 at 6:46 PM, George Kadianakis wrote: > > > Filename: XXX-mitm-bridge-detection-resistance.txt > Title: Bridge Detection Resistance against MITM-capable Adversaries > Author: George Kadianakis > Created: 07 Nov 2011 > Status: Open > This is added as proposal 191. __

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread George Kadianakis
Alright, posting an updated version of this proposal. It features shortened fingerprints and discussion on the certificate tagging. I hope 39 Base32 characters feel OK. If not, state your arguments and preferred solutions and I will update the proposal locally; I will try to not spam the list even

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread Marsh Ray
On 11/08/2011 09:36 AM, George Kadianakis wrote: Some arguments to consider against the tagging idea are: c) We most probably won't be able to tag CA-signed certificates. TLS 1.0 over TCP port 443 with a server cert rooting to a well-known CA is probably the biggest stream of opaque traffic o

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread George Kadianakis
Julian Yon writes: > On 08/11/11 07:55, Jérémy Bobbio wrote: >> On Tue, Nov 08, 2011 at 12:46:45AM +0100, George Kadianakis wrote: >>>Tor clients who use bridges and want to pin their SSL certificates >>>must specify the bridge's SSL certificate fingerprint as in: >>> Bridge 12.34.56

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread Julian Yon
On 08/11/11 07:55, Jérémy Bobbio wrote: > On Tue, Nov 08, 2011 at 12:46:45AM +0100, George Kadianakis wrote: >>Tor clients who use bridges and want to pin their SSL certificates >>must specify the bridge's SSL certificate fingerprint as in: >> Bridge 12.34.56.78 shared_secret=934caff42

Re: [tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-08 Thread Jérémy Bobbio
On Tue, Nov 08, 2011 at 12:46:45AM +0100, George Kadianakis wrote: >Tor clients who use bridges and want to pin their SSL certificates >must specify the bridge's SSL certificate fingerprint as in: > Bridge 12.34.56.78 shared_secret=934caff420aa7852b855 \ > > link_cert_fpr=38b

[tor-dev] Proposal: Bridge Detection Resistance against MITM-capable Adversaries

2011-11-07 Thread George Kadianakis
Filename: XXX-mitm-bridge-detection-resistance.txt Title: Bridge Detection Resistance against MITM-capable Adversaries Author: George Kadianakis Created: 07 Nov 2011 Status: Open 1. Overview Proposals 187, 189 and 190 make the first steps toward scanning resistant bridges. They attempt to