[tor-talk] Tor Survey

Andy Isaacson adi at hexapodia.org
Wed Jan 11 21:25:15 UTC 2012


Hi Marco,

Please discuss the DoS in public forums, I'm not interested in helping
you hide details of your supposed attack.  The norms for open source
development may conflict with your expectations of scientific papers,
but that's your problem not ours.

-andy

On Wed, Jan 11, 2012 at 11:47:37AM +0100, Marco Valerio Barbera wrote:
> Dear Tor Relay Administrator,
> 
> my name is Marco Valerio Barbera, I am a PhD student in Computer Science at La Sapienza University of Rome and I am currently doing a research study on the security of the Tor Network in collaboration with Angelos Keromytis, head of the Network Security Lab at Columbia University.
> 
> You are receiving this message because your e-mail address is associated to the Tor Relay(s) with nickname(s) and address(es):
> 
> tornadic 82.94.231.195
> 
> It has recently been discovered a new DoS attack that could allow an adversary to stop one or more Tor Relays from participating and providing service to the Tor Network. This kind of attack poses a potential threat to the hundreds of thousands of users around the globe that use Tor every day. For instance, an adversary may be able to shut down a substantial part of the Tor Network, forcing users to surf the web in a traceable way. In an even worse scenario, an adversary may attract a big part of the data flowing through the Tor Network to one or more malicious Tor Relays that could, thus, cooperate in deanonymizing Tor traffic without being noticed by the users.
> 
> The aim of our study is that of evaluating the amount of resources an adversary would need to perform such an attack and what would be the actual damage that the Tor Network would suffer. At the same time, we are working on a patch to be applied to the Tor software that could mitigate this issue.
> 
> The reason you are receiving this message is that, to improve our study, we require some extra information about the Relay(s) you are running that, unfortunately, is not publicly available. We would therefore like to ask a very little, but precious, help from your side in collecting this information and sharing it with us. Note that the information we need is *not* related in any way with the traffic that you are relaying in this moment or have relayed in the past, thus it cannot be directly used to affect the privacy of the Tor users. What we are interested in is related to the hardware characteristics (e.g., number of physical CPUs, amount of memory) and with some of the configuration parameters of your Tor Relay (e.g., number of processors the Tor Relay can use, bandwidth limit).
> 
> In the case you agree to help us, collecting this information won't steal much of your precious time. In order to make it easier for you to get it, you will find on the website linked at the end of this message a small shell script that you can run on the Tor Relay(s) themselves or, if possible, on another machine with the *same* hardware specs. The script doesn't need any special (i.e., root) permission to run, it won't download anything from the network, nor it will install any software on your machine. We also commented it so as to make it easier for you to understand it in case you wanted to check what is the exact sequence of operations it will perform and information it will collect. Any data saved by the shell script will be available in a human readable text format stored in an output directory you will specify. We encourage you to use the public key you will find on the bottom of this message to encrypt the data collected by the script before sending it to us. You ca
>  n get the same public key on the website linked at the end of this message. We would like to assure you that we will take extraordinary care in protecting in the best way we can the privacy of any information you will decide to share with us. We want also to assure you that, in the event it will be published, any data you will provide us will be carefully anonymized and given only in terms of aggregated statistics.
> 
> Together with the script, you will find a README file containing detailed instructions on how to use it and how to encrypt the results before sending them to us.
> 
> We thank you for your kind attention.
> 
> Best regards,
> 
> Marco Valerio Barbera
> 
> 
> You can find the script and the public key in any of these locations:
> 
> https://sites.google.com/site/marcobarbera/tor-survey
> http://www.dsi.uniroma1.it/~barbera/tor-survey.html
> 
> -----BEGIN PGP PUBLIC KEY BLOCK-----
> Version: GnuPG v1.4.11 (Darwin)
> 
> mQENBE8Fo8gBCADEwO0RNlXfTovI+LLGH8qGyRcDHycFc12URCZdol46sTPnNcrE
> 2w+KuIK841+QJt40tYBtE9/BT8CerQEGrEteiTIAClpltJcE+6Z04+bbS6EmDzb7
> WzpxF0Tv9UrGhGCBncGvFnFbxaJQBu+5KrhJJTrW++778WTqMHoXvEw2LA9QHQB5
> qaAgZbvi+2JHrXEB0Cp/OTtGXLz8uej/liifYNh8bYCYIpU8fe+7Q+1ktyPk75g3
> 1/bTgfywujIVxXoZyo2usSdEZ7KmrISA4E8TlCQwidK8dFEPNwREfcyVNfgrxXyS
> TpMj/41KWOfymBuR+x0gfpP7eUlzUoObFkaPABEBAAG0L01hcmNvIFZhbGVyaW8g
> QmFyYmVyYSA8YmFyYmVyYUBkc2kudW5pcm9tYTEuaXQ+iQE4BBMBAgAiBQJPBaPI
> AhsDBgsJCAcDAgYVCAIJCgsEFgIDAQIeAQIXgAAKCRAUhbbzQCoISDOaCACCtPjq
> o041Z6urq8SVrlK/I659C1fbRUPVi+DJSEP3yZWIDxgwxDGopgabB/NFMwULiKOv
> 9WNHWydxrxsFYA/+lwbr9YxbV8ShME/pzhR6K+kbT7AGSmBOefgVfCJywh7JcGb4
> kp59KKmX7EnHYEkir3HK3wX34ScPbttge1bTQfQF4bKvGcUbqStIn/rL5mGNfbeR
> IFUidMF6aa1CcPIvkqD2Gs7rv9hAXFVG7/3TjrrzIAsFdXhU6UIM45jwdUnsbLiD
> Jz96Qz4HLa9wNU7nuSDAqzz+t15O/Fffg55pcUB1MpFIAhVqLffGfAoGrihAylPU
> aZIqc9ZJk2nr96KLuQENBE8Fo8gBCADs+hN+b/fir4mlxr9EqycYYvieuwiGWttt
> ocpWuhk/MxCzCRUA2/0GWdqtgFnmygWAh6HBv0XOZS04n83XGkKMEtoSfR4KXc8m
> xhtYkeSxH0FUuLE6/R9kHYcE7Eg4Jt0RO+aiCSoY4VDK7n4SpqWKoSVNYXKoYr2L
> zoXQ/PGJ/7RH9RAzKZDdQ5sgKLbpXiwib8mkWYbtPhNIbW4mF5QNSG+705L0yGh4
> 2keiPQFRAvc8hnkcKx6OVpmxdYEVTJT1t+ViYptDhtYc8axAB2z2ZBVyeeam3AZ0
> 3aJcG7PbQB/dmDPAKwULEsPoNWXEDKwZP6LbGo0tTAcklAB+RBOvABEBAAGJAR8E
> GAECAAkFAk8Fo8gCGwwACgkQFIW280AqCEg6UQgAwqd2TMzE01KWiafP7uIyk92l
> hgVEahFPulJyeWCpbqzA+4fYtC1rT+kuoDbyHbzbkQZJEHIjGcDlPHpb1zbB7iQy
> 6HyKhxRQXVcGCgWbsycYbLM+lwXbOn6LFqq6I+wBaMvOpPFNipxenJfjIlXdZyjA
> DSxI7SNvm+AMSfmVC0SJuTmxZGLdu8NxUohsqf6tpfspM341yQQZ2kUPGcwx/Y4d
> wvei2cbtTf2jSpU+y6Bara9c7JPjPq8pNsakrFneF/4l2T3cLVI5B95SXY5XTaTI
> G1VNfyebQCPUS0kKvpbHGxFl+B2STFjMMRbCpiqH3jFhBOcIrBulXhqTz5oLcg==
> =OsQy
> -----END PGP PUBLIC KEY BLOCK-----
> 
> 
> 
> ---
> NOTICE
> This is an autonomous study, not supported neither directly nor indirectly by the Tor Project Inc. The Tor Project Inc. is not responsible for any content of this message.


More information about the tor-talk mailing list