[tor-talk] Retroactive traffic confirmation attacks on Tor through data retention records?

Pascal Pascal666 at Users.SourceForge.Net
Sat Apr 21 18:41:21 UTC 2012


MAC addresses are used by layer 2 protocols (see 
https://en.wikipedia.org/wiki/OSI_model ).  Once an IP packet traverses 
a layer 3 device (such as a router) the srcMac has been changed to that 
of the router's egress interface.  Unless your ISP provided your router, 
srcMac identifies only which router the packet came from, not the 
particular client.

Decent routers randomize source ports to prevent traffic correlation 
(makes it harder to confirm that two streams from the same router came 
from the same client).

If you need deniability, don't use an ISP provided router, make sure 
your router randomizes source ports, and have an open guest wifi network 
(though obviously make sure the guest network can only access the 
Internet, not your LAN).

-Pascal


On 4/21/2012 1:05 PM, Ondrej Mikle wrote:
> If the ISP's records store [srcIP, srcPort, srcMac, dstIP, dstPort, size,
> startTime, endTime] for every TCP connection, then it's definitely doable; note
> that srcMac is MAC of client visible from ISP's side of the router to internet
> (so that clients behind NAT can be identified, though the srcPort gives that
> away, too).


More information about the tor-talk mailing list