hostile node anonymity attack scenario

Geoffrey Goodell goodell at cassandra.eecs.harvard.edu
Tue Feb 1 06:08:52 UTC 2005


On Mon, Jan 31, 2005 at 09:34:10PM -0800, Paul Forgey wrote:
> That answers my question. So any attack approaching my scenario would 
> thus require that enough of these nodes have fooled whomever we trust to 
> publish the master list of permanent nodes. Or, in simpler terms, not 
> likely!

A more interesting question to ask might be, "what happens if a client
creates N independent connections through the network, over a long
period of time so that circuits are not reused?"  If a malicious
operator possesses only three nodes, and N is sufficiently large (i.e.
greater than n*(n-1)*(n-2), where n is the number of Tor nodes), then
chances are, the attacker would be able to break the anonymity of at
least one connection...

Geoff
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20050201/c07488f4/attachment-0001.pgp>


More information about the tor-talk mailing list