> Date: Sat, 18 Apr 2015 08:51:35 +0200
> From: Peter Palfrader <wea...@torproject.org>
> 
>>> On Fri, 17 Apr 2015, Jacob Appelbaum wrote:
>>> 
>>> On 4/17/15, Ian Goldberg <i...@cs.uwaterloo.ca> wrote:
>>> Remember that the purpose is to help first-time clients, who have never
>>> used the Tor network before, fetch their very first consensus.  To do
>>> that, they'll need addresses to contact bundled into the binary and/or
>>> distro without being able to look at a consensus first.

Disabling fallback directories in custom Tor networks (Trac #15642)

tor currently doesn't disable the list of fallback directories when the 
DirAuthorities or Alternate{Bridge,Dir}Authorities options are set.

This means that any fallback directories will still be used in test, private 
and custom Tor networks. This could mix descriptors from the public network in 
with private Tor network in certain circumstances (at the very least, when the 
private authorities are unreachable).

I suspect this is an undiscovered bug in the fallback directories feature. It 
hasn't really been an issue until now, as the list of fallback directories has 
been blank.

I am also concerned that this general area of the code lacks unit tests, which 
it might be wise to include before we effectively activate it for the first 
time.

I've created a git branch with a fix in the trac issue #15642 [0].
I've also included unit tests for the function I've modified as a commit in 
that branch.

But there's currently no coverage for the function that adds fallback 
directories. (In fact, I mock it in my unit tests, because I need it to do 
*something* so I know if it has been called or not.)

Loading from an Authority-Signed file of Fallback Directories

The function which loads fallback directories currently loads from a string 
array inside the function, so it would need to be modified to load from a 
signed file. I support the security benefits of signed fallback directories 
enough to write client code and unit tests for it, but I'm not sure how the 
code for the authorities would work - is the proposal to sign a section of the 
consensus, and output it as a separate file?

If so, we would either need to backport, and/or wait until a majority of the 
authorities update to tor versions with the feature. And perhaps a majority of 
clients as well, controlled by a consensus parameter? (Otherwise, using any 
entry in the file itself would allow clients to effectively be partitioned from 
the rest of the network by their behaviour.)

While I'm making a list, do we need to modify the existing proposal which 
describes fallback directories?

Is this change proposed for 0.2.7?
Or all currently supported releases?

0: https://trac.torproject.org/projects/tor/ticket/15642#comment:8

teor

teor2345 at gmail dot com
pgp 0xABFED1AC
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5

teor at blah dot im
OTR C3C57B23 349825DE 929A1DEF C3531C25 A32287ED
_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to