Onion addresses encode their own public key. They are thus self-authenticating, one of the security and privacy advantages of onion services, which are typically accessed via Tor Browser. Because of the mostly random-looking appearance of onion addresses, a number of onion discovery mechanisms have been created to permit routing to an onion address associated with a more meaningful URL, such as a registered domain name. We describe novel vulnerabilities engendered by onion discovery mechanisms recently introduced by Tor Browser that facilitate hijack and tracking of user connections. We also recall previously known hijack and tracking vulnerabilities engendered by use of alternative services that are facilitated and rendered harder to detect if the alternative service is at an onion address. Self-authenticating traditional addresses (SATAs) are valid DNS addresses or URLs that also contain a commitment to an onion public key. We describe how the use of SATAs in onion discovery counters these vulnerabilities. SATAs also expand the value of onion discovery by facilitating self-authenticated access from browsers that do not connect to services via the Tor network.
翻译:洋葱地址编码自己的公用钥匙。 因此,洋葱服务的安全和隐私优势之一是自我确认,这是洋葱服务的安全和隐私优势之一,通常通过托尔浏览器获取。由于洋葱地址的外观多半是随机的外观,因此建立了一些洋葱发现机制,允许在与更有意义的URL(如注册域名)相关的洋葱地址中转线。我们描述了托尔浏览器最近引入的便利劫持和跟踪用户连接的洋葱发现机制造成的新的脆弱性。我们还回顾以前已知的劫持和跟踪因使用替代服务而产生的脆弱性,替代服务得到便利,而且很难检测替代服务是否在洋葱地址。自我认证传统地址(SATA)是有效的DNS地址或URL,其中也包括对洋葱公用钥匙的承诺。我们描述了在洋葱发现中使用SATA(SATA)如何抵消了这些脆弱性。 SATA(SATA)也通过便利从不通过托尔网络连接服务的浏览器获取自动识别数据,从而扩大了洋葱发现的价值。