leaker-optimized versions of Tor

Gregory Maxwell gmaxwell at gmail.com
Wed Dec 8 15:50:18 UTC 2010


On Wed, Dec 8, 2010 at 10:11 AM, Mitar <mmitar at gmail.com> wrote:
> Hi!
>
>> Relaxing the realtime constraint, adding random delays, more
>> hops and also chaff trafic in a Tor derivate would arguably
>> make such attacks more difficult.
>
> I am asking just about more hops. Why would more hops be necessary? It
> is enough that one node introduces random delay and this is it?

It is strictly necessary that the bad guy not control 100% of the
forwarding nodes.

On a realtime onion network anonymity is bounded by timing attacks—
even if you could tolerate the delay of having a zillion middle nodes
the attacker could just watch the entrances an exits and correlate
timing. So adding a great many hops would not significantly increase
security.

A mix network can tolerate higher delays and, hopefully, eliminates
the timing attacks. So additional hops can be beneficial.

The down side is increased vulnerability to DOS attacks if flooders
can generate cheap round-the-world messages.


The creating a hidden service based overlay network, as was suggested
here by Karsten N., was what I thought when I read the thread— but I
was concerned that if the network identity of all/most of the nodes is
hidden that an attacker could spin up thousands of fake mix nodes
without even needing a lot of network resources. They could make it
far more likely that all your hops were controlled by one party.
Although the risk exists for non hidden service based designs, it's
probably much easier with an anonymity layer in between. Any design
using hidden services would specifically need to address this risk.
***********************************************************************
To unsubscribe, send an e-mail to majordomo at torproject.org with
unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/



More information about the tor-talk mailing list