[tor-bugs] #17067 [Tor]: useful cover traffic

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Sep 25 12:02:58 UTC 2015


#17067: useful cover traffic
-------------------------+-----------------
     Reporter:  elypter  |      Owner:
         Type:  project  |     Status:  new
     Priority:  normal   |  Milestone:
    Component:  Tor      |    Version:
   Resolution:           |   Keywords:
Actual Points:           |  Parent ID:
       Points:           |
-------------------------+-----------------

Comment (by isis):

 Replying to [ticket:17067 elypter]:
 > if an adversary is sniffing between client and entry guard and between
 exit relay and destination server he can do traffic correlation in both
 directions.

 Sort of. I think you mean "traffic fingerprinting". Also, the
 effectiveness of traffic fingerprinting attacks are still currently
 debatable.

 > one way of hiding returning traffic could be to let the middle relay
 send cover traffic to lets say 5 random entry guards as soon as it
 recieves returning traffic. the entry guards send that traffic to one of
 their clients.

 Essentially, all relays talk to all other relays, all the time. A better
 specification of this idea is already contained within
 [https://gitweb.torproject.org/torspec.git/tree/proposals/254-padding-
 negotiation.txt proposal #254]. Please contribute further discussion of it
 to the author on [https://lists.torproject.org/pipermail/tor-
 dev/2015-September/009485.html the corresponding tor-dev mailing list
 thread].

 > the adversary would not be able to know who of the 6 people recieved
 data from that server. while still being a large amount of overhead its
 not as much as maxing out all connections.

 This is an insane amount of overheading, and again, I would direct you to
 the above-mentioned proposal for a better formulated design (also with
 significantly less overhead).

 > for sending traffic thats not as exit relays would have to send
 something to random servers.

 I am unable to parse what you meant in that sentence.

 > instead the client upload bandwidth could be reduced and the client
 could send constant low bandwith cover stream.

 Again, see proposal linked above.

 > this cover bandwidth could then be used for many useful things like:
 >
 > -provide a decentralized private cloud storage
 > -spread metadata and tor updates
 > -allow download content or embedded media on onion sites to be hosted in
 an anonymous high lattency p2p network
 > -website archive
 > -mail service

 ''wat''

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17067#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list