[tor-talk] Suggestion: make _hidden services_ choose randomentry nodes often!

Sebastian Hahn mail at sebastianhahn.net
Sat Oct 22 12:50:15 UTC 2011


On Oct 22, 2011, at 2:03 PM, hikki at Safe-mail.net wrote:

> -------- Original Message --------
> From: Sebastian Hahn <mail at sebastianhahn.net>
> Apparently from: tor-talk-bounces at lists.torproject.org
> To: tor-talk at lists.torproject.org
> Subject: Re: [tor-talk] Suggestion: make _hidden services_ choose randomentry nodes often!
> Date: Fri, 21 Oct 2011 14:54:29 +0200
> 
>> Unfortunately, you got it all wrong. There's a trivial attack against any
>> hidden service that doesn't use entry guards: Make a lot of connections
>> to it, while running at least one relay. Then do some timing analysis to
>> see when your connection to the hidden service coincides with a
>> connection to the node that you control, and write down the IP address
>> of the person making the connection, and you have de-anonymized
>> the hidden service.
>> 
>> If you have 200 bad entry nodes under your control, that attack will
>> work very quickly and reliably, whereas there's still a good chance
>> that you need to keep those nodes running for a few months for the
>> hidden service to pick one of those nodes as guard.
> 
> No, I didn't mean that the HS should choose random nodes. I meant that a 
> HS should use _guards_ only, but switch between all available _guards_ 
> randomly and often, so you don't stick to a (bad) guard long enough for 
> the operator to make any traffic analysis.
> 
> If your HS connects to a (bad) guard, but stays there for only 5-10 min 
> before jumping to another random guard, the guard operators will have 
> very little to no time to investigate the clients and then do traffic 
> analysis.

This assumption is wrong. Just making a single connection is enough
for timing analysis, and that means if you ever choose a bad node -
whether that's a guard node or not - you've already lost.

> To me this is simple math and logics, and if this is less secure than 
> choosing 3 static guards for HS usage, please explain why.

I hope the above made it clearer?


More information about the tor-talk mailing list