#28988: Bridge node wil be exposed by malicious middle nodes. --------------------------+------------------------------------ Reporter: TBD.Chen | Owner: (none) Type: defect | Status: closed Priority: Medium | Milestone: Component: Core Tor/Tor | Version: Tor: 0.3.5.3-alpha Severity: Normal | Resolution: duplicate Keywords: Bridge | Actual Points: Parent ID: #7144 | Points: Reviewer: | Sponsor: --------------------------+------------------------------------
Comment (by TBD.Chen): > Expecting clients to keep a small number of middle nodes is not enough, because malicious clients won't do that. If the attacker is the Client, then before she connect to the bridge, she have already nown the IP address of the bridge, and she do not need to expose the bridge to the other middle node. However, if the attacker is the Middle node, then the innocent client keep a small number of middle nodes may effectively evade the malicous Middle node. This is based the assumption that the attacker only want to collect the IP of bridge , and she never want to help the other attacker. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28988#comment:2> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs