[Whonix-devel] Defeating TCP ISN skew attacks with SipHash or BLAKE2
bancfc at openmailbox.org
bancfc at openmailbox.org
Thu Jan 12 03:50:14 CET 2017
After discussing this with the Tor developers it turns out the specific
fingerprinting attack I pointed out before still remains. [1] I
understand your priorities probably lie elsewhere but can you please
consider patching the secure_seq.c:seq_scale() timer out of the ISN code
to close up this risk?
[0]
https://lists.torproject.org/pipermail/tor-dev/2017-January/011788.html
- my original question
[1]
https://lists.torproject.org/pipermail/tor-dev/2017-January/011789.html
More information about the Whonix-devel
mailing list