[Whonix-devel] Defeating TCP ISN skew attacks with SipHash or BLAKE2

bancfc at openmailbox.org bancfc at openmailbox.org
Thu Jan 12 03:50:14 CET 2017


After discussing this with the Tor developers it turns out the specific 
fingerprinting attack I pointed out before still remains. [1] I 
understand your priorities probably lie elsewhere but can you please 
consider patching the secure_seq.c:seq_scale() timer out of the ISN code 
to close up this risk?


[0] 
https://lists.torproject.org/pipermail/tor-dev/2017-January/011788.html 
- my original question

[1] 
https://lists.torproject.org/pipermail/tor-dev/2017-January/011789.html


More information about the Whonix-devel mailing list