mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-24 12:23:32 +01:00
more on helper nodes
svn:r3430
This commit is contained in:
parent
985e26f017
commit
69a46ff522
@ -178,7 +178,12 @@ in practice tor's threat model is based entirely on the goal of dispersal
|
|||||||
and diversity. george and steven describe an attack \cite{draft} that
|
and diversity. george and steven describe an attack \cite{draft} that
|
||||||
lets them determine the nodes used in a circuit; yet they can't identify
|
lets them determine the nodes used in a circuit; yet they can't identify
|
||||||
alice or bob through this attack. so it's really just the endpoints that
|
alice or bob through this attack. so it's really just the endpoints that
|
||||||
remain secure. see \ref{subsec:routing-zones} for discussion of larger
|
remain secure. and the enclave model seems particularly threatened by
|
||||||
|
this, since this attack lets us identify endpoints when they're servers.
|
||||||
|
see \ref{subsec:helper-nodes} for discussion of some ways to address this
|
||||||
|
issue.
|
||||||
|
|
||||||
|
see \ref{subsec:routing-zones} for discussion of larger
|
||||||
adversaries and our dispersal goals.
|
adversaries and our dispersal goals.
|
||||||
|
|
||||||
\section{Crossroads: Policy issues}
|
\section{Crossroads: Policy issues}
|
||||||
@ -318,13 +323,25 @@ IDS.] Our server operators tell us that exit policies are one of
|
|||||||
the main reasons they're willing to run Tor over previous attempts
|
the main reasons they're willing to run Tor over previous attempts
|
||||||
at anonymizing networks. Adding an IDS to handle exit policies would
|
at anonymizing networks. Adding an IDS to handle exit policies would
|
||||||
increase the security complexity of Tor, and would likely not work anyway,
|
increase the security complexity of Tor, and would likely not work anyway,
|
||||||
as evidenced by the entire field of IDS and counter-IDS papers.
|
as evidenced by the entire field of IDS and counter-IDS papers. Many
|
||||||
|
potential abuse issues are resolved by the fact that Tor only transports
|
||||||
|
valid TCP streams (as opposed to arbitrary IP including malformed packets
|
||||||
|
and IP floods), so exit policies become even \emph{more} important as
|
||||||
|
we become able to transport IP packets. We also need a way to compactly
|
||||||
|
characterize the exit policies and let clients parse them to decide
|
||||||
|
which nodes will allow which packets to exit.
|
||||||
\item [The Tor-internal name spaces would need to be redesigned.] We
|
\item [The Tor-internal name spaces would need to be redesigned.] We
|
||||||
support hidden service \tt{.onion} addresses, and other special addresses
|
support hidden service \tt{.onion} addresses, and other special addresses
|
||||||
like \tt{.exit} (see Section \ref{subsec:}), by intercepting the addresses
|
like \tt{.exit} (see Section \ref{subsec:}), by intercepting the addresses
|
||||||
when they are passed to the Tor client.
|
when they are passed to the Tor client.
|
||||||
\end{enumerate}
|
\end{enumerate}
|
||||||
|
|
||||||
|
This list is discouragingly long right now, but we recognize that it
|
||||||
|
would be good to investigate each of these items in further depth and to
|
||||||
|
understand which are actual roadblocks and which are easier to resolve
|
||||||
|
than we think. We certainly wouldn't mind if Tor one day is able to
|
||||||
|
transport a greater variety of protocols.
|
||||||
|
|
||||||
\subsection{Mid-latency}
|
\subsection{Mid-latency}
|
||||||
|
|
||||||
Mid-latency. Can we do traffic shape to get any defense against George's
|
Mid-latency. Can we do traffic shape to get any defense against George's
|
||||||
@ -382,6 +399,16 @@ that using Tor as a building block for Free Haven is going to be really
|
|||||||
hard. Also, they're brittle in terms of intersection and observation
|
hard. Also, they're brittle in terms of intersection and observation
|
||||||
attacks. Would be nice to have hot-swap services, but hard to design.
|
attacks. Would be nice to have hot-swap services, but hard to design.
|
||||||
|
|
||||||
|
Game theory for helper nodes: if Alice offers a hidden service on a
|
||||||
|
server (enclave model), and nobody ever uses helper nodes, then against
|
||||||
|
George+Steven's attack she's totally nailed. If only Alice uses a helper
|
||||||
|
node, then she's still identified as the source of the data. If everybody
|
||||||
|
uses a helper node (including Alice), then the attack identifies the
|
||||||
|
helper node and also Alice, and knows which one is which. If everybody
|
||||||
|
uses a helper node (but not Alice), then the attacker figures the real
|
||||||
|
source was a client that is using Alice as a helper node. [How's my
|
||||||
|
logic here?]
|
||||||
|
|
||||||
in practice, sites like bloggers without borders (www.b19s.org) are
|
in practice, sites like bloggers without borders (www.b19s.org) are
|
||||||
running tor servers but more important are advertising a hidden-service
|
running tor servers but more important are advertising a hidden-service
|
||||||
address on their front page. doing this can provide increased robustness
|
address on their front page. doing this can provide increased robustness
|
||||||
|
Loading…
Reference in New Issue
Block a user