-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
coordinator attack: add clearnet/Tor attack and inconsistent round id attack #1867
base: master
Are you sure you want to change the base?
Conversation
MarnixCroes
commented
Jan 2, 2025
This allows the coordinator to link all communication and inputs and outputs of the coinjoin and thus complete de-anonymisation. | ||
This is why Wasabi communicates over Tor by default. | ||
- (Theoretical) Tor network-level de-anonymisation: | ||
Wasabi uses Tor by default, assuming that this is the most available and usable anonymous way to communicate, and that it cannot be de-anonymised at the network level. | ||
If Tor does not uphold these assumptions, the client could be de-anonymised. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: "anonymization" is used elsewhere in the docs.
This allows the coordinator to link all communication and inputs and outputs of the coinjoin and thus complete de-anonymisation. | |
This is why Wasabi communicates over Tor by default. | |
- (Theoretical) Tor network-level de-anonymisation: | |
Wasabi uses Tor by default, assuming that this is the most available and usable anonymous way to communicate, and that it cannot be de-anonymised at the network level. | |
If Tor does not uphold these assumptions, the client could be de-anonymised. | |
This allows the coordinator to link all communication and inputs and outputs of the coinjoin and thus complete de-anonymization. | |
This is why Wasabi communicates over Tor by default. | |
- (Theoretical) Tor network-level de-anonymization: | |
Wasabi uses Tor by default, assuming that this is the most available and usable anonymous way to communicate, and that it cannot be de-anonymized at the network level. | |
If Tor does not uphold these assumptions, the client could be de-anonymized. |
The client asks the coordinator for the active rounds, and the coordinator returns the _Round ID_. | ||
The round ID is the resulting hash of information about the round, such as when the round started and the parameters. The coordinator could create rounds that do not match the parameters and/or create rounds with inputs that were supposed to be registered in different rounds. | ||
This allows the coordinator to de-anonymize and/or link users' coins. | ||
To mitigate against this, the client calculates the round ID by itself to verify, and will abort if it detects the coordinator is doing this. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that doesn't mitigate anything because ownership proof "verification" trusts the coordinator to provide prevouts
even if they were, the round id is insufficient to ensure consistency
I will wait to merge this until all known potential attacks are clarified & mitigated. |