[or-cvs] r8827: another paragraph of pessimism for the network signature sec (tor/trunk/doc/design-paper)

arma at seul.org arma at seul.org
Wed Oct 25 04:31:05 UTC 2006


Author: arma
Date: 2006-10-25 00:30:58 -0400 (Wed, 25 Oct 2006)
New Revision: 8827

Modified:
   tor/trunk/doc/design-paper/blocking.tex
Log:
another paragraph of pessimism for the network signature section


Modified: tor/trunk/doc/design-paper/blocking.tex
===================================================================
--- tor/trunk/doc/design-paper/blocking.tex	2006-10-25 02:51:45 UTC (rev 8826)
+++ tor/trunk/doc/design-paper/blocking.tex	2006-10-25 04:30:58 UTC (rev 8827)
@@ -574,8 +574,9 @@
 been modified by the local attacker) to how to learn about a working
 bridge relay.
 
-There's another catch though. We need to make sure that simply connecting
-to a bridge relay doesn't set off red flags.
+There's another catch though. We need to make sure that the network
+traffic we generate by simply connecting to a bridge relay doesn't stand
+out too much.
 
 %The following section describes ways to bootstrap knowledge of your first
 %bridge relay, and ways to maintain connectivity once you know a few
@@ -633,7 +634,7 @@
 it with blank entries for each field, or should we research the common
 values that Firefox and Internet Explorer use and try to imitate those?
 
-Lastly, Tor's TLS handshake involves sending two certificates in each
+Worse, Tor's TLS handshake involves sending two certificates in each
 direction: one certificate contains the self-signed identity key for
 the router, and the second contains the current link key, signed by the
 identity key. We use these to authenticate that we're talking to the right
@@ -646,6 +647,20 @@
 % for really, and how much work would it be to start acting like a normal
 % browser? -RD
 
+Lastly, what if the adversary starts observing the network traffic even
+more closely? Even if our TLS handshake looks innocent, our traffic timing
+and volume still look different than a user making a secure web connection
+to his bank. The same techniques used in the growing trend to build tools
+to recognize encrypted Bittorrent traffic~\cite{bt-traffic-shaping}
+could be used to identify Tor communication and recognize bridge
+relays. Rather than trying to look like encrypted web traffic, we may be
+better off trying to blend with some other encrypted network protocol. The
+first step is to compare typical network behavior for a Tor client to
+typical network behavior for various other protocols. This statistical
+cat-and-mouse game is made more complex by the fact that Tor transports a
+variety of protocols, and we'll want to automatically handle web browsing
+differently from, say, instant messaging.
+
 \subsection{Identity keys as part of addressing information}
 
 We have described a way for the blocked user to bootstrap into the



More information about the tor-commits mailing list