Fwd: [tor-dev] "Anomalous keys in Tor relays" technical report now available
---------- Forwarded message ---------- From: Laura M. Roberts <laurar@princeton.edu> Date: Wed, Apr 5, 2017 at 3:00 PM Subject: [tor-dev] "Anomalous keys in Tor relays" technical report now available To: "tor-dev@lists.torproject.org" <tor-dev@lists.torproject.org> Hello, Tor devs! We have just published a (not yet peer-reviewed) technical report entitled "Anomalous keys in Tor relays." https://nymity.ch/anomalous-tor-keys/ The project was inspired by the "Mining Your P's and Q's" paper from Heninger et. al., and in it, we take a closer look at the RSA keys used in Tor since 2005. We found that entities had purposely created anomalous keys in order to attack Tor's onion services and that researchers had inadvertently created weak keys while conducting experiments on Tor. (None of the weak keys we found are affecting the current Tor network.) We welcome your questions and feedback! Regards, George, Claudia, Laura, & Philipp _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
On Wed, Apr 05, 2017 at 11:57:15PM -0400, grarpamp wrote:
We have just published a (not yet peer-reviewed) technical report entitled "Anomalous keys in Tor relays." https://nymity.ch/anomalous-tor-keys/
The anomalous keys share prime factors or moduli. Assume they mean RSA keys. What is the point of using such keys? Won't sharing the private keys have the same effect on sniffing, being stealthy?
participants (2)
-
Georgi Guninski
-
grarpamp