-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 08/21/2012 01:30 PM, Runa A. Sandvik wrote:
> From > https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/path-spec.txt: > > "We do not choose more than one router in a given /16 subnet (unless > EnforceDistinctSubnets is 0)." So, seeing as how this is the case (verified from the Git repo for those who are interested), I have my doubts about how relevant the "Control X number of /'s" attack against users of the Tor network is. It stands to reason that of all of the /24's that make up a particular /16, only one IP address in that entire space might be utilized for a given circuit. That suggests that an attacker won't get nearly as much information with this attack as it seems. It's still worth noting, however. - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ "The system of teaching is the teaching of the system." --Guy Debord -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAlAz3zQACgkQO9j/K4B7F8EetgCg6XbHsyZuWw0BmQTSLfxLwekr sMwAn0apeLHG8aCrlTHcm/ID6wWcDLYa =4GMC -----END PGP SIGNATURE----- _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk