On 2012-03-18 13:57 , Fabio Pietrosanti (naif) wrote: > On 3/18/12 1:09 PM, Jeroen Massar wrote: >> >> >> On 18 Mar 2012, at 12:46, "Fabio Pietrosanti (naif)" <li...@infosecurity.ch> >> wrote: >> >>> - Security issue >>> >>> Looking at the server seizure threat scenario, who seize the computer >>> running TorHS will be able to know the identity of the TorHS itself by >>> looking at the "hostname" file >> >> Why not simply use Full Disk Encryption or similar to protect all the data >> files, hat avoids a compromise for any file on the system, heck if hey turn >> the box off they can't even see there is Tor on it at all. also heavily note >> that the actual content served is likely much more valuable and you will >> want to protect that too. > > Yes, but any application that store "sensitive data" like keys should > provide an integrated way to protect such sensitive data. > > Think about the "keychain" of PGP, or keychain of Firefox for digital > certificate, etc, etc >
> All major applications that need to handle "keys" support a built-in > feature to provide different degree of protection for such "keys". And you want to add another one that has to be separately managed? :) As I mentioned btw, the Tor keys are not that valuable, the content that sits behind it is though. And if you are doing it right you are actually sending TLS/SSL/SSH through the tunnel instead of clear text. > So the idea is to "aggregate" the TorHS related "sensitive information" > and apply a protection schema with a "keychain" providing some security > feature. Which is perfectly done by simply crypting the partition/disk the data is stored on, which additionally will resolve quite a few other attacks too. And the attack vectors that are left open with these is much better understood too. Note that if you just use non-encrypted storage there is a big chance that the 'old' file is still present on the file system which can give away quite a few details already. Greets, Jeroen _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev