[Whonix-devel] Defeating TCP ISN skew attacks with SipHash or BLAKE2

Jean-Philippe Aumasson jeanphilippe.aumasson at gmail.com
Thu Jan 12 07:53:30 CET 2017


Hi,

thanks for reaching out, not sure we'll have time to work on this soon, but
happy to answer any question about siphash/halfsiphash.

Best,

JP

On Thu, Jan 12, 2017 at 3:50 AM <bancfc at openmailbox.org> wrote:

> After discussing this with the Tor developers it turns out the specific
> fingerprinting attack I pointed out before still remains. [1] I
> understand your priorities probably lie elsewhere but can you please
> consider patching the secure_seq.c:seq_scale() timer out of the ISN code
> to close up this risk?
>
>
> [0]
> https://lists.torproject.org/pipermail/tor-dev/2017-January/011788.html
> - my original question
>
> [1]
> https://lists.torproject.org/pipermail/tor-dev/2017-January/011789.html
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.whonix.org/pipermail/whonix-devel/attachments/20170112/42b761a9/attachment.html>


More information about the Whonix-devel mailing list