Skip to content
This repository has been archived by the owner on Oct 23, 2020. It is now read-only.

Protect Tor Hidden Service Key #27

Open
fpietrosanti opened this issue Aug 21, 2012 · 4 comments
Open

Protect Tor Hidden Service Key #27

fpietrosanti opened this issue Aug 21, 2012 · 4 comments

Comments

@fpietrosanti
Copy link
Contributor

Currently Tor have a security weakness so that the Tor Hidden Service Key and the file containing the hostname are stored in clear-text onto the computer's filesystem with no ability to protect it.

The only way to currently protect that kind of file resources is trough the implementation of filesystem encryption, but unfortunately it does require administrative privileges and kernel modules to work.

This ticket is about the implementation of a system to protect the Tor Hidden Service Key and Hostname file.

The implementation maybe done trough:

That way it would be possible to store securely Tor HS Key in APAF's Secure Database and load it dynamically via TorCP

@joxer
Copy link

joxer commented Sep 4, 2012

Why not using a fuse filesystem? Surely there will be some implementation of encrypted file system in user space

@fpietrosanti
Copy link
Contributor Author

Fuse require a kernel module to be loaded, that introduce even more cross-platform dependency issues.

Additionally Fuse kernel module loading require administrative privileges.

@fpietrosanti
Copy link
Contributor Author

On txtorcon issue there is a good discussion in using another approach with FIFO / Named Pipes

@fpietrosanti
Copy link
Contributor Author

On Tor there's someone that recently pushed a patch to be reviewed doing that feature for handling TorHs via TorCP: https://trac.torproject.org/projects/tor/ticket/6411#comment:6

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants