[or-cvs] r13997: Add research idea re studying the effectiveness of timing at (website/trunk/en)

mikeperry at seul.org mikeperry at seul.org
Thu Mar 13 03:45:16 UTC 2008


Author: mikeperry
Date: 2008-03-12 23:45:15 -0400 (Wed, 12 Mar 2008)
New Revision: 13997

Modified:
   website/trunk/en/volunteer.wml
Log:

Add research idea re studying the effectiveness of timing
attacks against relay nodes that are also used as clients.
Also, toss in some ideas on relay queue manipulation to
implement adaptive padding and other cover mechanisms without
extra traffic overhead.



Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml	2008-03-12 23:18:50 UTC (rev 13996)
+++ website/trunk/en/volunteer.wml	2008-03-13 03:45:15 UTC (rev 13997)
@@ -949,6 +949,21 @@
 is confident he has won? Are there scenarios (e.g. not transmitting much)
 that slow down the attack? Do some traffic padding or traffic shaping
 schemes work better than others?</li>
+<li>A related question is: Does running a relay/bridge provide additional
+protection against these timing attacks? Can an external adversary that can't
+see inside TLS links still recognize individual streams reliably? 
+Does the amount of traffic carried degrade this ability any? What if the
+client-relay deliberately delayed upstream relayed traffic to create a queue
+that could be used to mimic timings of client downstream traffic to make it
+look like it was also relayed? This same queue could also be used for masking
+timings in client upstream traffic with the techniques from <a
+href="http://www.freehaven.net/anonbib/#ShWa-Timing06">adaptive padding</a>,
+but without the need for additional traffic. Would such an interleaving of
+client upstream traffic obscure timings for external adversaries? Would the
+strategies need to be adjusted for asymmetric links? For example, on
+asymmetric links, is it actually possible to differentiate client traffic from
+natural bursts due to their asymmetric capacity? Or is it easier than
+symmetric links for some other reason?</li>
 <li>The "routing zones attack": most of the literature thinks of
 the network path between Alice and her entry node (and between the
 exit node and Bob) as a single link on some graph. In practice,



More information about the tor-commits mailing list