Delivery-Date: Mon, 01 Sep 2014 05:38:46 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 50C091E0690;
	Mon,  1 Sep 2014 05:38:44 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 024FC30B24;
	Mon,  1 Sep 2014 09:38:40 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id B47B130780
 for <tor-talk@lists.torproject.org>; Mon,  1 Sep 2014 09:38:36 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id CyY7Y7DbKnAA for <tor-talk@lists.torproject.org>;
 Mon,  1 Sep 2014 09:38:36 +0000 (UTC)
Received: from mail-wi0-x231.google.com (mail-wi0-x231.google.com
 [IPv6:2a00:1450:400c:c05::231])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 6C79830751
 for <tor-talk@lists.torproject.org>; Mon,  1 Sep 2014 09:38:36 +0000 (UTC)
Received: by mail-wi0-f177.google.com with SMTP id cc10so5730323wib.16
 for <tor-talk@lists.torproject.org>; Mon, 01 Sep 2014 02:38:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=message-id:date:from:user-agent:mime-version:to:subject:references
 :in-reply-to:content-type:content-transfer-encoding;
 bh=4eldnSk7Op+UHrblrqRVO07vRgjVG7BB93udFWg+BVI=;
 b=ahfHcWSLSS+gHz6UcJRL4u2QBreu8YDPyI4OtuzNzCGFSxUtdLJA5H9B3xl29pISD8
 RDhWkKvKuCmiyACw3Yx06oaJeoj6Hm4CGEJXl3ApupSUMWuKFNe+oZnLtFQ99dH4PGpx
 GqbxPAfk/YjeRrWIuW6qZOcrM0hzATedcSIrpgK9O35zXe+U4rBNzkXsyvHosFujbwra
 WQrHL5IJ9KniIIhzt/a+RciDkqaGOPNm2YTqka1+tug4aDzBvmjNq0Zkzf6CBuXVfkBP
 aDIugLLxgHwvytZlDXOTuGUBSeRQzGyroMvzPqMQeJ74zpU2Wq2QX73dA3ZXxo9DqjxT
 sqZw==
X-Received: by 10.180.107.170 with SMTP id hd10mr20367841wib.77.1409564313418; 
 Mon, 01 Sep 2014 02:38:33 -0700 (PDT)
Received: from [192.168.1.11] (ANice-652-1-127-63.w83-201.abo.wanadoo.fr.
 [83.201.150.63])
 by mx.google.com with ESMTPSA id qd1sm8591453wic.8.2014.09.01.02.38.32
 for <tor-talk@lists.torproject.org>
 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
 Mon, 01 Sep 2014 02:38:32 -0700 (PDT)
Message-ID: <54043EA0.2040300@gmail.com>
Date: Mon, 01 Sep 2014 11:38:40 +0200
From: Aymeric Vitte <vitteaymeric@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.3;
 rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <mailman.13.1409486402.9061.tor-talk@lists.torproject.org>
 <54038B84.4030604@gmail.com>
In-Reply-To: <54038B84.4030604@gmail.com>
Subject: [tor-talk] I have a quick question about security of tor with 3
	nodes
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"; Format="flowed"
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

Restoring the right subject for this thread...

Maybe in the context of the Tor network it would not be very useful and =

safe but probably there is still an interest that the first node does =

not know it is the first one, not sure it's really possible for the Tor =

network since as you mention it's probably not very difficult for a node =

to find out that it is the first one.

Regards,

Le 31/08/2014 22:54, Charles Thomas a =E9crit :
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> As long as the current guard model is in place then the relay could
> probably tell if its a client vs bridge by the frequency of visit. I'm
> assuming that a client visits one of its guard more often on average
> then a random bridge would connect to that guard. There is probably
> something in the code that tells the node which spot they are in.
>
> The network would be slightly less secure because the chances of
> having the first and last node would be improved, making correlation
> attacks easier. It would how ever not be a third easier though,
> because of Guards and exits wouldn't be used (much) as a middle node.
>
> On 08/31/2014 05:00 AM, tor-talk-request@lists.torproject.org wrote:
>> Let's imagine the Tor network is choosing 2 or 3 nodes, the first
>> node would not be able to know it is the first one (because it does
>> not know if the path is 2 or 3 nodes), it could check that the IPs
>> are not belonging to the Tor network and then find out that it is
>> the first one, but these IPs could be secret bridges, so it might
>> not be really sure it is the first one.
>> But maybe the benefit of such proposal (if proven safe) would be
>> too small in the context of the Tor network compared to the
>> traditionnal three nodes selection.
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
>
> iQIcBAEBAgAGBQJUA4t2AAoJEDsKeXBBl7wEbYIQAMzbTiH3MTI/mDOUNqaFB/vB
> GA0vKDPhbEt/NRwum8ZPUmjTnWwCFeHqWQEwt9SVztEH1xeJ+Gs2xfYK/V83AzPo
> dkkf75Okj4aH6w+xJWvlXx2BnopraE4tyTx1PPnyiryffxsDPFU0EfA/ljLtudv2
> NnKKuZjSWXrS+aMLjbKTD+cPNywwL3nlYBUdOaeKoUe84kWS2jX7Hw3X+GzcOQWd
> ITgmarqj4/ctJkktXdW+M9sLr6UzVNCCgx34vV+wkrEeNnzT/unfO9CRqwNR+BdS
> kgqWwrPnoIQgHbp5WwjGY0GcXEYcHRQzBAI40zyIBQXRwrZ2zbYthf5ygJxKN0HE
> 7pJ/676pHmf3ZeKZV28g9whPl6l3r4MAlyq6lLmP/RDbCaVieQQIZXYtzd7soGIZ
> +yKVN+eXsJvusgF5u6mucKV7gmmKrVco9kIGW9HHjY0GDsENTJi5KrSl97Ws2Tzn
> FQfMkOjncazTli/7Gm1r9Evw2ItzYiUCUbbzpCSb4c5iRvoSzSMJqmBv9M+I7EuJ
> 8oJAUf6v3Iq4FTeeq1Dm53ACFBWdywW09cz5o4HBGmLc83SxjWCPA/IOdvZZRjGj
> eAY6jlgAPRovjMHiOISVOERDZeLITV011OJzVdlESqw8UkkfkyogfWrKEOVPM1hh
> cl4XEYYwV7jYBCTYcNTn
> =3Dji+6
> -----END PGP SIGNATURE-----

-- =

Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

-- =

tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

