[tor-project] Many bridges (22%) have nickname "ki"

David Fifield david at bamsoftware.com
Wed Feb 15 23:29:20 UTC 2017


On Tue, Dec 13, 2016 at 10:37:31AM -0800, David Fifield wrote:
> This is a bit of a followup to my earlier post on obfs4 bridges with
> formulaic nicknames:
> https://lists.torproject.org/pipermail/tor-project/2016-November/000809.html
> 
> 
> Those bridges are still there, but today I noticed a new weirdness: 756
> bridges all having the nickname "ki". 756 is 21.8% of the total number,
> 3464. At the moment, "ki" far outnumbers every other nickname, apart from
> "Unnamed":

Upcoming research paper mentions the "ki" bridges, but still doesn't
determine their purpose:
https://software.imdea.org/~juanca/papers/torbridges_ndss17.pdf

	Section V-A
	The yellow middle bar represents a cluster of 3 bridges run by
	the same organization, that we call by their nickname, Ki, which
	change fingerprint up to once an hour (but keep their IP
	addresses stable, see Section VI). The Ki cluster produced a few
	dozen fingerprints in July 2012, jumped to a few hundreds in
	December 2012 and to a few thousands in February 2014. In March
	2016, those 3 bridges are responsible for 32% of all
	fingerprints, corresponding to 7% of the active fingerprints and
	68% of the inactive fingerprints, as most of their fingerprints
	do not live long enough to obtain the Running flag. After
	discounting those extraneous fingerprints, the number of active
	fingerprints in April 2016 is slightly over 5K.

	Section V-D
	Port 444 is a special case since in principle is associated to
	the Simple Network Paging Protocol (SNPP), a not so popular
	protocol. However, according to CollecTor data, roughly 3K
	active fingerprints are using it on April 2016. The reason for
	this is that this OR port is used by the Ki bridges that change
	fingerprint often, as introduced in Section V-A. Those Ki
	bridges artificially inflate the usage of this OR port, a
	behavior that does not manifest on other OR ports.

	Section VI-A
	Overall, 94.1% of the bridge IP addresses did not change
	fingerprint, 5.5% changed fingerprint once, and 0.4% changed
	fingerprint multiple times. The bridges with multiple
	fingerprint changes include the 3 Ki bridges, which present a
	different fingerprint every time we connect to them (on a closer
	look we find that they change fingerprint roughly every hour).
	Furthermore, we observe that over 70% of the IP addresses with
	fingerprint changes belong to 2 clusters of private bridges each
	using multiple nearby IP addresses. These IPs change fingerprint
	on the same dates, so it is possible that bridges in each
	cluster were reassigned IP addresses on those dates.


More information about the tor-project mailing list