Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #29620

Closed (moved)
(moved)
Open
Created Feb 28, 2019 by David Goulet@dgoulet🆘

bridge: Make tor sign the networkstatus-bridges document

Turns out that networkstatus-bridges document, when dumped on disk on the Bridge Authority side, is not signed.

This means that when it is pushed to BridgeDB, the only trust anchor we have is the SSH key thus making BridgeDB unable to verify the received document signature that it was indeed signed by the authority.

For now, it is "OK" that we do that because the configured SSH key between the authority and BridgeDB has a pinned IP address to it so an attacker would need to steal that key and push descriptors from that IP which is somehow already a lot.

Regardless, adding the signature is something quite cheap that tor can do which would allow BridgeDB an extra validation there instead of relying solely on the SSH tunnel.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking