Open GoogleCodeExporter opened 9 years ago
this private_key file can not be used to decrypt traffic.
When Tor builds a tunnel to the rendezvous point then it will first encrypt to
the first node, then to the second and then to the third node. After connecting
the tunnels at the rendezvous points it will do a Diffie Hellman key exchange
with the other buddy with a random symmetrical key, so once the connection is
established there will be 4 layers of encryption at each end (at your ISP
connection) and still one layer at the rendezvous point and none of them is
derived from private_key.
the only purpose of the private_key file is to make the .onion address work, to
authenticate the owner of the hidden service address. It is used only for
establishing the hidden service itself, to prove to the tor network that you
really own this .onion address. If it is stolen then the thief can impersonate
you and receive incoming connections under your address. It is NOT used for
content encryption, this is a completely separate mechanism.
But you are right with your concerns about this file lying around unencrypted.
I don't like this fact too.
But I have no easy solution, Tor needs it somewhere in the file system. I have
thought about things like temporary RAM disks already and also hope that some
day the Tor project might change it so that a hidden service can also be
started by supplying the key through the control port without the need for a
file on the disk, I have seen a feature request for this already having been
discussed but I don't know if and when it will be implemented.
Currently the simplest way to make it really extremely secure would be to use a
knoppix live CD (or similar) installed on an USB drive (in knoppix you can
enable an encrypted persistent home partition on the USB drive, probably other
live linuxes have something like this too).
Original comment by prof7...@gmail.com
on 20 Nov 2011 at 12:00
Many thanks, Bernd!
Would you recommend trying the new Tor's Tails live CD/USB?
Original comment by ojtam...@gmail.com
on 20 Nov 2011 at 1:52
I don't know enough, but there seem to be a RAM disk of sorts design to work
with Tor - perhaps that could be useful in solving some of the Torchat security
dilemmas?
http://opensource.dyc.edu/tor-ramdisk
Original comment by ojtam...@gmail.com
on 27 Nov 2011 at 11:19
Original issue reported on code.google.com by
ojtam...@gmail.com
on 20 Nov 2011 at 3:28