[tor-bugs] #23856 [Core Tor/Tor]: Reduce relay bandwidth stats interval to 24 hours

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 25 13:07:49 UTC 2017


#23856: Reduce relay bandwidth stats interval to 24 hours
-----------------------------------+------------------------------------
 Reporter:  teor                   |          Owner:  (none)
     Type:  defect                 |         Status:  new
 Priority:  High                   |      Milestone:  Tor: 0.3.2.x-final
Component:  Core Tor/Tor           |        Version:
 Severity:  Normal                 |     Resolution:
 Keywords:  guard-discovery-stats  |  Actual Points:
Parent ID:                         |         Points:  1
 Reviewer:                         |        Sponsor:  SponsorQ
-----------------------------------+------------------------------------

Comment (by teor):

 Replying to [comment:9 jvsg]:
 > What happens in those cases where client and adversary are one and the
 same? An adversary could create many connections to the service, which
 could lead to the spike in stats.

 Yes, this is one possible scenario I describe in my tor-dev@ email at
 https://lists.torproject.org/pipermail/tor-dev/2017-October/012517.html

 To defend against this particular case, onion service operators could use
 a tool like OnionBalance to spread load across a set of service instances.
 But this comes with its own security tradeoffs. It's also possible to
 limit bandwidth at the onion service, but that doesn't stop the traffic
 being sent as far as the guard.

 > Would 24 hour interval be immune to that?

 There are multiple ways to determine relay load: using published relay
 statistics is one of the easiest. We are trying to decrease the usefulness
 of published relay statistics for this attack, while preserving their
 utility to relay operators and the network.

 No simple change will make tor immune. This is because there is a design
 tradeoff in tor: clients choose one guard, so they have a low probability
 of encountering a malicious guard, and so they are less linkable. But
 using one guard makes inflating its bandwidth easier.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23856#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list