[anti-censorship-team] "Dissecting Tor Bridges" NDSS'17 paper

Philipp Winter phw at torproject.org
Tue Jul 9 20:27:39 UTC 2019


I skimmed Matic et al.'s NDSS'17 paper "Dissecting Tor Bridges: a
Security Evaluation of Their Private and Public Infrastructures":
<https://censorbib.nymity.ch/pdf/Matic2017a.pdf>

Below are the points that stood out the most to me.  Note however that
the study is from 2017 and some numbers may no longer be valid.

* With the exception of China and the U.S., default bridges served by
  far the most users.  The popularity of default bridges makes them a
  single point of failure that is easy for censors to block.

  We have been losing default bridges over the last few months and
  should be recruiting new operators:
  <https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/DefaultBridges>
  We have a list of criteria for new operators at the bottom of the
  page.  If you are interested in running a default bridge, please get
  in touch.

* Four OR ports (443, 8443, 444, and 9001) were used much more often
  than others.  Today, 19% of bridges use port 9001 and 17% use port
  443.  Port 9001 is problematic because it is an attractive target for
  Internet-wide scans.  So is port 443 but it has some merit for users
  who seek to circumvent corporate firewalls.  Is there any reason at
  all to have bridges listen on port 9001?  If not, we should ask these
  operators to pick a new port.

* If a censor discovers a bridge and the bridge runs an SSH server,
  the censor can fetch its fingerprint and use Shodan to find other SSH
  servers with the same fingerprint.  These servers may also be running
  bridges.  Bridge-specific SSH keys would fix this problem.  We may
  want to create a "bridge opsec guide" for subtle issues like these.

* Shodan and Censys are search engines for Internet-wide scans.  The
  authors were successful in using these datasets to find 35% of
  "public" bridges, i.e., bridges that publish their server descriptor
  to the bridge authority.  The idea is to look for certificates that
  resemble a Tor bridge and then actively probe the port to confirm this
  suspicion.  This is a tricky balancing act: most bridges should
  probably avoid the ports that Shodan and Censys scan but we need a few
  of them for users whose firewalls whitelist these ports.

* Many bridges run transports that are both resistant *and* vulnerable
  to the GFW's active probing attacks.  The vulnerable protocols are a
  liability to the resistant protocols.  We fixed this issue in BridgeDB
  (#28655) but it remains a problem for Internet-wide scans: if a censor
  discovers a bridge via a port 9001 scan, obfs4's probing-resistance
  doesn't help.  The need to haven an open OR port (#7349) remains a
  painful issue.

  Also, wouldn't it be useful to have a mechanism to instruct bridges to
  stop serving a transport?  At this point, there is no reason to still
  serve obfs2, obfs3, or ScrambleSuit.

Cheers,
Philipp



More information about the anti-censorship-team mailing list