Changeset f3bc270 in trunk
- Timestamp:
- 2016-08-30T15:55:08Z (9 years ago)
- Branches:
- master
- Children:
- 3126d49
- Parents:
- 832a798
- git-author:
- str4d <str4d@…> (2014-09-05 01:14:22)
- git-committer:
- Brian Warner <warner@…> (2016-08-30 15:55:08)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
TabularUnified docs/anonymity-roadmap.rst ¶
r832a798 rf3bc270 23 23 24 24 * txi2p 25 * Add "endpoint parameters" to Tahoe 26 * Servers provide the minimum client endpoint string required to connect to them: 27 * ``tcp:example.org:1337`` 28 * ``ssl:example.org:443`` 29 * ``i2p:longstring.b32.i2p`` 30 * Clients may need to extend the strings with client-specific per-type parameters in order to successfully connect: 31 * ``tcp:example.org:1337:timeout=60`` 32 * ``ssl:example.org:443:caCertsDir=/etc/ssl/certs`` 33 * ``i2p:longstring.b32.i2p:tunnelNick=tahoe:inport=10000`` 34 * These should be set in ``tahoe.cfg``: 35 * ``[node]clientEndpointParams = tcp:timeout=60,ssl:caCertsDir=/etc/ssl/certs,i2p:tunnelNick=tahoe:inport=10000`` 36 * Tahoe parses, keeps an internal map, applies the relevant params to a client endpoint string before connecting 37 * Client endpoint string whitelisting 38 * Server publishes an endpoint string for a client to connect to 39 * A malicious server could publish strings containing client-specific parameters that compromise the user 40 * Unsure what parameters could actually be used maliciously on their own, but definitely possible in concert with other attacks. 41 * The client should not accept strings that contain client-specific parameters 42 * How to tell the difference? Tahoe can't keep a list of everything that is safe. 43 * Maybe an endpoint API method that takes a client endpoint string and returns a safe one. 25 44 26 45
Note: See TracChangeset
for help on using the changeset viewer.