2005-01-22 09:35:01 +01:00
|
|
|
\documentclass{llncs}
|
2005-02-08 06:43:12 +01:00
|
|
|
% XXXX NM: Fold ``bandwidth and usability'' into ``Tor and file-sharing'' --
|
2005-02-07 06:52:49 +01:00
|
|
|
% ``bandwidth and file-sharing''.
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-01-22 09:35:01 +01:00
|
|
|
\usepackage{url}
|
|
|
|
\usepackage{amsmath}
|
|
|
|
\usepackage{epsfig}
|
|
|
|
|
2005-02-08 21:34:57 +01:00
|
|
|
\setlength{\textwidth}{6.1in}
|
|
|
|
\setlength{\textheight}{8.5in}
|
|
|
|
\setlength{\topmargin}{1cm}
|
|
|
|
\setlength{\oddsidemargin}{.5cm}
|
|
|
|
\setlength{\evensidemargin}{.5cm}
|
2005-02-07 23:22:54 +01:00
|
|
|
|
2005-01-22 09:35:01 +01:00
|
|
|
\newenvironment{tightlist}{\begin{list}{$\bullet$}{
|
|
|
|
\setlength{\itemsep}{0mm}
|
|
|
|
\setlength{\parsep}{0mm}
|
|
|
|
% \setlength{\labelsep}{0mm}
|
|
|
|
% \setlength{\labelwidth}{0mm}
|
|
|
|
% \setlength{\topsep}{0mm}
|
|
|
|
}}{\end{list}}
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-01-22 02:35:29 +01:00
|
|
|
\begin{document}
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-08 02:40:19 +01:00
|
|
|
\title{Challenges in deploying low-latency anonymity}
|
2005-01-22 09:35:01 +01:00
|
|
|
|
2005-02-08 06:43:12 +01:00
|
|
|
\author{Roger Dingledine\inst{1} \and
|
|
|
|
Nick Mathewson\inst{1} \and
|
|
|
|
Paul Syverson\inst{2}}
|
2005-02-07 07:46:49 +01:00
|
|
|
\institute{The Free Haven Project \email{<\{arma,nickm\}@freehaven.net>} \and
|
2005-02-08 21:34:57 +01:00
|
|
|
Naval Research Laboratory \email{<syverson@itd.nrl.navy.mil>}}
|
2005-01-22 09:35:01 +01:00
|
|
|
|
2005-01-23 00:10:53 +01:00
|
|
|
\maketitle
|
2005-02-08 07:54:47 +01:00
|
|
|
\pagestyle{plain}
|
2005-01-23 00:10:53 +01:00
|
|
|
|
|
|
|
\begin{abstract}
|
2005-02-07 06:52:49 +01:00
|
|
|
There are many unexpected or unexpectedly difficult obstacles to
|
|
|
|
deploying anonymous communications. Drawing on our experiences deploying
|
2005-02-08 02:40:19 +01:00
|
|
|
Tor (the second-generation onion routing network), we describe social
|
2005-02-07 06:52:49 +01:00
|
|
|
challenges and technical issues that must be faced
|
|
|
|
in building, deploying, and sustaining a scalable, distributed, low-latency
|
|
|
|
anonymity network.
|
2005-01-23 00:10:53 +01:00
|
|
|
\end{abstract}
|
|
|
|
|
2005-01-07 04:22:18 +01:00
|
|
|
\section{Introduction}
|
2005-02-07 06:52:49 +01:00
|
|
|
% Your network is not practical unless it is sustainable and distributed.
|
|
|
|
Anonymous communication is full of surprises. This paper discusses some
|
|
|
|
unexpected challenges arising from our experiences deploying Tor, a
|
|
|
|
low-latency general-purpose anonymous communication system. We will discuss
|
|
|
|
some of the difficulties we have experienced and how we have met them (or how
|
|
|
|
we plan to meet them, if we know). We will also discuss some less
|
|
|
|
troublesome open problems that we must nevertheless eventually address.
|
|
|
|
%We will describe both those future challenges that we intend to explore and
|
|
|
|
%those that we have decided not to explore and why.
|
|
|
|
|
|
|
|
Tor is an overlay network for anonymizing TCP streams over the
|
|
|
|
Internet~\cite{tor-design}. It addresses limitations in earlier Onion
|
|
|
|
Routing designs~\cite{or-ih96,or-jsac98,or-discex00,or-pet00} by adding
|
|
|
|
perfect forward secrecy, congestion control, directory servers, integrity
|
|
|
|
checking, configurable exit policies, and location-hidden services using
|
|
|
|
rendezvous points. Tor works on the real-world Internet, requires no special
|
|
|
|
privileges or kernel modifications, requires little synchronization or
|
|
|
|
coordination between nodes, and provides a reasonable tradeoff between
|
|
|
|
anonymity, usability, and efficiency.
|
|
|
|
|
|
|
|
We first publicly deployed a Tor network in October 2003; since then it has
|
2005-02-07 23:22:54 +01:00
|
|
|
grown to over a hundred volunteer Tor nodes
|
2005-02-07 20:55:21 +01:00
|
|
|
and as much as 80 megabits of
|
2005-02-07 06:52:49 +01:00
|
|
|
average traffic per second. Tor's research strategy has focused on deploying
|
|
|
|
a network to as many users as possible; thus, we have resisted designs that
|
2005-02-07 23:22:54 +01:00
|
|
|
would compromise deployability by imposing high resource demands on node
|
2005-02-07 06:52:49 +01:00
|
|
|
operators, and designs that would compromise usability by imposing
|
|
|
|
unacceptable restrictions on which applications we support. Although this
|
|
|
|
strategy has
|
|
|
|
its drawbacks (including a weakened threat model, as discussed below), it has
|
2005-02-07 20:55:21 +01:00
|
|
|
made it possible for Tor to serve many thousands of users and attract
|
|
|
|
funding from diverse sources whose goals range from security on a
|
|
|
|
national scale down to the liberties of each individual.
|
2005-02-07 06:52:49 +01:00
|
|
|
|
2005-02-08 21:34:57 +01:00
|
|
|
While~\cite{tor-design} gives an overall view of Tor's
|
|
|
|
design and goals, this paper describes policy, social, and technical
|
2005-02-07 06:52:49 +01:00
|
|
|
issues that we face as we continue deployment.
|
|
|
|
Rather than trying to provide complete solutions to every problem here, we
|
|
|
|
lay out the assumptions and constraints that we have observed while
|
|
|
|
deploying Tor in the wild. In doing so, we aim to create a research agenda
|
|
|
|
for others to help in addressing these issues. We believe that the issues
|
2005-02-08 21:34:57 +01:00
|
|
|
described here will be of general interest to any and all
|
|
|
|
projects attempting to build
|
2005-02-07 06:52:49 +01:00
|
|
|
and deploy practical, useable anonymity networks in the wild.
|
|
|
|
|
|
|
|
%While the Tor design paper~\cite{tor-design} gives an overall view its
|
|
|
|
%design and goals,
|
|
|
|
%this paper describes the policy and technical issues that Tor faces as
|
|
|
|
%we continue deployment. Rather than trying to provide complete solutions
|
|
|
|
%to every problem here, we lay out the assumptions and constraints
|
|
|
|
%that we have observed through deploying Tor in the wild. In doing so, we
|
|
|
|
%aim to create a research agenda for others to
|
|
|
|
%help in addressing these issues.
|
2005-02-05 02:03:17 +01:00
|
|
|
% Section~\ref{sec:what-is-tor} gives an
|
|
|
|
%overview of the Tor
|
|
|
|
%design and ours goals. Sections~\ref{sec:crossroads-policy}
|
|
|
|
%and~\ref{sec:crossroads-design} go on to describe the practical challenges,
|
|
|
|
%both policy and technical respectively,
|
|
|
|
%that stand in the way of moving
|
|
|
|
%from a practical useful network to a practical useful anonymous network.
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-01-31 09:34:38 +01:00
|
|
|
%\section{What Is Tor}
|
2005-02-07 06:52:49 +01:00
|
|
|
\section{Background}
|
|
|
|
Here we give a basic overview of the Tor design and its properties, and
|
|
|
|
compare Tor to other low-latency anonymity designs.
|
|
|
|
|
|
|
|
\subsection{Tor, threat models, and distributed trust}
|
2005-01-25 11:38:09 +01:00
|
|
|
\label{sec:what-is-tor}
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-05 02:03:17 +01:00
|
|
|
%Here we give a basic overview of the Tor design and its properties. For
|
|
|
|
%details on the design, assumptions, and security arguments, we refer
|
|
|
|
%the reader to the Tor design paper~\cite{tor-design}.
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
%\medskip
|
|
|
|
\noindent
|
|
|
|
{\bf How Tor works.}
|
2005-01-23 00:10:53 +01:00
|
|
|
Tor provides \emph{forward privacy}, so that users can connect to
|
|
|
|
Internet sites without revealing their logical or physical locations
|
|
|
|
to those sites or to observers. It also provides \emph{location-hidden
|
|
|
|
services}, so that critical servers can support authorized users without
|
|
|
|
giving adversaries an effective vector for physical or online attacks.
|
2005-02-05 02:03:17 +01:00
|
|
|
The design provides these protections even when a portion of its own
|
2005-01-23 00:10:53 +01:00
|
|
|
infrastructure is controlled by an adversary.
|
|
|
|
|
2005-02-07 06:52:49 +01:00
|
|
|
To create a private network pathway with Tor, the client software
|
2005-01-27 10:57:06 +01:00
|
|
|
incrementally builds a \emph{circuit} of encrypted connections through
|
2005-02-07 23:22:54 +01:00
|
|
|
Tor nodes on the network. The circuit is extended one hop at a time, and
|
|
|
|
each node along the way knows only which node gave it data and which
|
|
|
|
node it is giving data to. No individual Tor node ever knows the complete
|
2005-01-27 10:57:06 +01:00
|
|
|
path that a data packet has taken. The client negotiates a separate set
|
2005-02-08 21:34:57 +01:00
|
|
|
of encryption keys for each hop along the circuit. % to ensure that each
|
2005-02-07 06:52:49 +01:00
|
|
|
%hop can't trace these connections as they pass through.
|
2005-02-07 23:22:54 +01:00
|
|
|
Because each node sees no more than one hop in the
|
|
|
|
circuit, neither an eavesdropper nor a compromised node can use traffic
|
2005-02-05 02:03:17 +01:00
|
|
|
analysis to link the connection's source and destination.
|
2005-02-07 06:52:49 +01:00
|
|
|
For efficiency, the Tor software uses the same circuit for all the TCP
|
|
|
|
connections that happen within the same short period.
|
|
|
|
Later requests use a new
|
2005-02-08 21:34:57 +01:00
|
|
|
circuit, to complicate long-term linkability between different actions by
|
2005-01-27 10:57:06 +01:00
|
|
|
a single user.
|
|
|
|
|
|
|
|
Tor also makes it possible for users to hide their locations while
|
|
|
|
offering various kinds of services, such as web publishing or an instant
|
2005-02-07 06:52:49 +01:00
|
|
|
messaging server. Using ``rendezvous points'', other Tor users can
|
2005-01-27 10:57:06 +01:00
|
|
|
connect to these hidden services, each without knowing the other's network
|
|
|
|
identity.
|
|
|
|
|
2005-01-29 02:05:09 +01:00
|
|
|
Tor attempts to anonymize the transport layer, not the application layer, so
|
|
|
|
application protocols that include personally identifying information need
|
|
|
|
additional application-level scrubbing proxies, such as
|
2005-02-08 21:34:57 +01:00
|
|
|
Privoxy~\cite{privoxy} for HTTP\@. Furthermore, Tor does not permit arbitrary
|
2005-02-07 06:52:49 +01:00
|
|
|
IP packets; it only anonymizes TCP streams and DNS request, and only supports
|
|
|
|
connections via SOCKS (see Section~\ref{subsec:tcp-vs-ip}).
|
2005-01-23 00:10:53 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
Most node operators do not want to allow arbitary TCP connections to leave
|
|
|
|
their server. To address this, Tor provides \emph{exit policies} so that
|
|
|
|
each exit node can block the IP addresses and ports it is unwilling to allow.
|
2005-02-08 21:34:57 +01:00
|
|
|
Tor nodes advertise their exit policies to the directory servers, so that
|
2005-02-07 23:22:54 +01:00
|
|
|
client can tell which nodes will support their connections.
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
As of January 2005, the Tor network has grown to around a hundred nodes
|
2005-01-31 09:34:38 +01:00
|
|
|
on four continents, with a total capacity exceeding 1Gbit/s. Appendix A
|
2005-02-07 23:22:54 +01:00
|
|
|
shows a graph of the number of working nodes over time, as well as a
|
2005-02-08 21:34:57 +01:00
|
|
|
graph of the number of bytes being handled by the network over time. At
|
2005-01-31 09:34:38 +01:00
|
|
|
this point the network is sufficiently diverse for further development
|
2005-02-07 23:22:54 +01:00
|
|
|
and testing; but of course we always encourage and welcome new nodes
|
2005-01-31 09:34:38 +01:00
|
|
|
to join the network.
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-08 21:34:57 +01:00
|
|
|
Tor research and development has been funded by ONR and DARPA
|
2005-02-07 07:38:16 +01:00
|
|
|
for use in securing government
|
|
|
|
communications, and by the Electronic Frontier Foundation, for use
|
|
|
|
in maintaining civil liberties for ordinary citizens online. The Tor
|
|
|
|
protocol is one of the leading choices
|
|
|
|
to be the anonymizing layer in the European Union's PRIME directive to
|
|
|
|
help maintain privacy in Europe. The University of Dresden in Germany
|
|
|
|
has integrated an independent implementation of the Tor protocol into
|
|
|
|
their popular Java Anon Proxy anonymizing client.
|
|
|
|
% This wide variety of
|
|
|
|
%interests helps maintain both the stability and the security of the
|
|
|
|
%network.
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
\medskip
|
|
|
|
\noindent
|
|
|
|
{\bf Threat models and design philosophy.}
|
2005-02-07 06:52:49 +01:00
|
|
|
The ideal Tor network would be practical, useful and and anonymous. When
|
|
|
|
trade-offs arise between these properties, Tor's research strategy has been
|
|
|
|
to insist on remaining useful enough to attract many users,
|
|
|
|
and practical enough to support them. Only subject to these
|
|
|
|
constraints do we aim to maximize
|
|
|
|
anonymity.\footnote{This is not the only possible
|
|
|
|
direction in anonymity research: designs exist that provide more anonymity
|
|
|
|
than Tor at the expense of significantly increased resource requirements, or
|
|
|
|
decreased flexibility in application support (typically because of increased
|
|
|
|
latency). Such research does not typically abandon aspirations towards
|
|
|
|
deployability or utility, but instead tries to maximize deployability and
|
|
|
|
utility subject to a certain degree of inherent anonymity (inherent because
|
|
|
|
usability and practicality affect usage which affects the actual anonymity
|
2005-02-08 06:43:12 +01:00
|
|
|
provided by the network \cite{econymics,back01}).}
|
2005-02-07 07:38:16 +01:00
|
|
|
%{We believe that these
|
|
|
|
%approaches can be promising and useful, but that by focusing on deploying a
|
|
|
|
%usable system in the wild, Tor helps us experiment with the actual parameters
|
|
|
|
%of what makes a system ``practical'' for volunteer operators and ``useful''
|
|
|
|
%for home users, and helps illuminate undernoticed issues which any deployed
|
|
|
|
%volunteer anonymity network will need to address.}
|
2005-02-07 06:52:49 +01:00
|
|
|
Because of this strategy, Tor has a weaker threat model than many anonymity
|
|
|
|
designs in the literature. In particular, because we
|
|
|
|
support interactive communications without impractically expensive padding,
|
|
|
|
we fall prey to a variety
|
|
|
|
of intra-network~\cite{back01,attack-tor-oak05,flow-correlation04} and
|
|
|
|
end-to-end~\cite{danezis-pet2004,SS03} anonymity-breaking attacks.
|
2005-01-29 08:25:44 +01:00
|
|
|
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-07 06:52:49 +01:00
|
|
|
Tor does not attempt to defend against a global observer. In general, an
|
|
|
|
attacker who can observe both ends of a connection through the Tor network
|
|
|
|
can correlate the timing and volume of data on that connection as it enters
|
|
|
|
and leaves the network, and so link a user to her chosen communication
|
|
|
|
parties. Known solutions to this attack would seem to require introducing a
|
|
|
|
prohibitive degree of traffic padding between the user and the network, or
|
|
|
|
introducing an unacceptable degree of latency (but see Section
|
|
|
|
\ref{subsec:mid-latency}). Also, it is not clear that these methods would
|
2005-02-07 20:55:21 +01:00
|
|
|
work at all against even a minimally active adversary that can introduce timing
|
2005-02-07 06:52:49 +01:00
|
|
|
patterns or additional traffic. Thus, Tor only attempts to defend against
|
|
|
|
external observers who cannot observe both sides of a user's connection.
|
2005-01-29 02:05:09 +01:00
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
The distinction between traffic correlation and traffic analysis is
|
|
|
|
not as cut and dried as we might wish. In \cite{hintz-pet02} it was
|
|
|
|
shown that if data volumes of various popular
|
|
|
|
responder destinations are catalogued, it may not be necessary to
|
|
|
|
observe both ends of a stream to learn a source-destination link.
|
|
|
|
This should be fairly effective without simultaneously observing both
|
|
|
|
ends of the connection. However, it is still essentially confirming
|
|
|
|
suspected communicants where the responder suspects are ``stored'' rather
|
|
|
|
than observed at the same time as the client.
|
|
|
|
Similarly latencies of going through various routes can be
|
|
|
|
catalogued~\cite{back01} to connect endpoints.
|
|
|
|
This is likely to entail high variability and massive storage since
|
|
|
|
% XXX hintz-pet02 just looked at data volumes of the sites. this
|
|
|
|
% doesn't require much variability or storage. I think it works
|
|
|
|
% quite well actually. Also, \cite{kesdogan:pet2002} takes the
|
|
|
|
% attack another level further, to narrow down where you could be
|
|
|
|
% based on an intersection attack on subpages in a website. -RD
|
|
|
|
%
|
|
|
|
% I was trying to be terse and simultaneously referring to both the
|
|
|
|
% Hintz stuff and the Back et al. stuff from Info Hiding 01. I've
|
|
|
|
% separated the two and added the references. -PFS
|
|
|
|
routes through the network to each site will be random even if they
|
|
|
|
have relatively unique latency characteristics. So this does not seem
|
|
|
|
an immediate practical threat. Further along similar lines, the same
|
|
|
|
paper suggested a ``clogging attack''. In \cite{attack-tor-oak05}, a
|
|
|
|
version of this was demonstrated to be practical against portions of
|
|
|
|
the fifty node Tor network as deployed in mid 2004. There it was shown
|
|
|
|
that an outside attacker can trace a stream through the Tor network
|
|
|
|
while a stream is still active simply by observing the latency of his
|
|
|
|
own traffic sent through various Tor nodes. These attacks do not show
|
2005-02-07 23:22:54 +01:00
|
|
|
the client address, only the first node within the Tor network, making
|
2005-02-08 21:34:57 +01:00
|
|
|
helper nodes all the more worthy of exploration. (See
|
|
|
|
Section~\ref{subsec:helper-nodes}.)
|
2005-02-07 20:55:21 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
Against internal attackers who sign up Tor nodes, the situation is more
|
2005-01-29 02:05:09 +01:00
|
|
|
complicated. In the simplest case, if an adversary has compromised $c$ of
|
2005-02-07 23:22:54 +01:00
|
|
|
$n$ nodes on the Tor network, then the adversary will be able to compromise
|
2005-01-29 02:05:09 +01:00
|
|
|
a random circuit with probability $\frac{c^2}{n^2}$ (since the circuit
|
|
|
|
initiator chooses hops randomly). But there are
|
|
|
|
complicating factors:
|
2005-02-07 20:55:21 +01:00
|
|
|
(1)~If the user continues to build random circuits over time, an adversary
|
2005-01-29 02:05:09 +01:00
|
|
|
is pretty certain to see a statistical sample of the user's traffic, and
|
|
|
|
thereby can build an increasingly accurate profile of her behavior. (See
|
2005-02-08 06:43:12 +01:00
|
|
|
Section~\ref{subsec:helper-nodes} for possible solutions.)
|
2005-02-07 20:55:21 +01:00
|
|
|
(2)~An adversary who controls a popular service outside of the Tor network
|
2005-02-05 02:03:17 +01:00
|
|
|
can be certain of observing all connections to that service; he
|
2005-01-29 02:05:09 +01:00
|
|
|
therefore will trace connections to that service with probability
|
|
|
|
$\frac{c}{n}$.
|
2005-02-07 23:22:54 +01:00
|
|
|
(3)~Users do not in fact choose nodes with uniform probability; they
|
|
|
|
favor nodes with high bandwidth or uptime, and exit nodes that
|
2005-02-07 20:55:21 +01:00
|
|
|
permit connections to their favorite services.
|
2005-02-08 21:34:57 +01:00
|
|
|
(See Section~\ref{subsec:routing-zones} for discussion of how larger
|
|
|
|
adversaries affect our dispersal goals.)
|
2005-02-07 20:55:21 +01:00
|
|
|
|
|
|
|
%\begin{tightlist}
|
|
|
|
%\item If the user continues to build random circuits over time, an adversary
|
|
|
|
% is pretty certain to see a statistical sample of the user's traffic, and
|
|
|
|
% thereby can build an increasingly accurate profile of her behavior. (See
|
|
|
|
% \ref{subsec:helper-nodes} for possible solutions.)
|
|
|
|
%\item An adversary who controls a popular service outside of the Tor network
|
|
|
|
% can be certain of observing all connections to that service; he
|
|
|
|
% therefore will trace connections to that service with probability
|
|
|
|
% $\frac{c}{n}$.
|
2005-02-07 23:22:54 +01:00
|
|
|
%\item Users do not in fact choose nodes with uniform probability; they
|
|
|
|
% favor nodes with high bandwidth or uptime, and exit nodes that
|
2005-02-07 20:55:21 +01:00
|
|
|
% permit connections to their favorite services.
|
|
|
|
%\end{tightlist}
|
2005-01-29 02:05:09 +01:00
|
|
|
|
|
|
|
%discuss $\frac{c^2}{n^2}$, except how in practice the chance of owning
|
|
|
|
%the last hop is not $c/n$ since that doesn't take the destination (website)
|
|
|
|
%into account. so in cases where the adversary does not also control the
|
|
|
|
%final destination we're in good shape, but if he *does* then we'd be better
|
|
|
|
%off with a system that lets each hop choose a path.
|
|
|
|
%
|
|
|
|
%Isn't it more accurate to say ``If the adversary _always_ controls the final
|
|
|
|
% dest, we would be just as well off with such as system.'' ? If not, why
|
|
|
|
% not? -nm
|
2005-01-31 09:34:38 +01:00
|
|
|
% Sure. In fact, better off, since they seem to scale more easily. -rd
|
2005-01-26 11:46:53 +01:00
|
|
|
|
2005-02-07 06:52:49 +01:00
|
|
|
% XXXX the below paragraph should probably move later, and merge with
|
2005-02-05 02:03:17 +01:00
|
|
|
% other discussions of attack-tor-oak5.
|
2005-02-04 19:32:40 +01:00
|
|
|
|
2005-02-07 07:38:16 +01:00
|
|
|
%Murdoch and Danezis describe an attack
|
|
|
|
%\cite{attack-tor-oak05} that lets an attacker determine the nodes used
|
|
|
|
%in a circuit; yet s/he cannot identify the initiator or responder,
|
|
|
|
%e.g., client or web server, through this attack. So the endpoints
|
|
|
|
%remain secure, which is the goal. It is conceivable that an
|
|
|
|
%adversary could attack or set up observation of all connections
|
|
|
|
%to an arbitrary Tor node in only a few minutes. If such an adversary
|
|
|
|
%were to exist, s/he could use this probing to remotely identify a node
|
|
|
|
%for further attack. Of more likely immediate practical concern
|
|
|
|
%an adversary with active access to the responder traffic
|
|
|
|
%wants to keep a circuit alive long enough to attack an identified
|
|
|
|
%node. Thus it is important to prevent the responding end of the circuit
|
|
|
|
%from keeping it open indefinitely.
|
|
|
|
%Also, someone could identify nodes in this way and if in their
|
|
|
|
%jurisdiction, immediately get a subpoena (if they even need one)
|
|
|
|
%telling the node operator(s) that she must retain all the active
|
|
|
|
%circuit data she now has.
|
|
|
|
%Further, the enclave model, which had previously looked to be the most
|
|
|
|
%generally secure, seems particularly threatened by this attack, since
|
|
|
|
%it identifies endpoints when they're also nodes in the Tor network:
|
|
|
|
%see Section~\ref{subsec:helper-nodes} for discussion of some ways to
|
|
|
|
%address this issue.
|
|
|
|
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
\medskip
|
|
|
|
\noindent
|
|
|
|
{\bf Distributed trust.}
|
2005-02-07 07:38:16 +01:00
|
|
|
In practice Tor's threat model is based entirely on the goal of
|
2005-02-07 08:44:06 +01:00
|
|
|
dispersal and diversity.
|
2005-02-07 23:22:54 +01:00
|
|
|
Tor's defense lies in having a diverse enough set of nodes
|
2005-02-07 06:52:49 +01:00
|
|
|
to prevent most real-world
|
|
|
|
adversaries from being in the right places to attack users.
|
|
|
|
Tor aims to resist observers and insiders by distributing each transaction
|
|
|
|
over several nodes in the network. This ``distributed trust'' approach
|
|
|
|
means the Tor network can be safely operated and used by a wide variety
|
|
|
|
of mutually distrustful users, providing more sustainability and security
|
|
|
|
than some previous attempts at anonymizing networks.
|
|
|
|
The Tor network has a broad range of users, including ordinary citizens
|
|
|
|
concerned about their privacy, corporations
|
|
|
|
who don't want to reveal information to their competitors, and law
|
|
|
|
enforcement and government intelligence agencies who need
|
|
|
|
to do operations on the Internet without being noticed.
|
|
|
|
|
|
|
|
No organization can achieve this security on its own. If a single
|
|
|
|
corporation or government agency were to build a private network to
|
|
|
|
protect its operations, any connections entering or leaving that network
|
|
|
|
would be obviously linkable to the controlling organization. The members
|
|
|
|
and operations of that agency would be easier, not harder, to distinguish.
|
|
|
|
|
|
|
|
Instead, to protect our networks from traffic analysis, we must
|
|
|
|
collaboratively blend the traffic from many organizations and private
|
|
|
|
citizens, so that an eavesdropper can't tell which users are which,
|
2005-02-08 21:34:57 +01:00
|
|
|
and who is looking for what information. %By bringing more users onto
|
|
|
|
%the network, all users become more secure~\cite{econymics}.
|
|
|
|
%[XXX I feel uncomfortable saying this last sentence now. -RD]
|
|
|
|
%[So, I took it out. I think we can do without it. -PFS]
|
2005-02-07 06:52:49 +01:00
|
|
|
Naturally, organizations will not want to depend on others for their
|
|
|
|
security. If most participating providers are reliable, Tor tolerates
|
|
|
|
some hostile infiltration of the network. For maximum protection,
|
|
|
|
the Tor design includes an enclave approach that lets data be encrypted
|
|
|
|
(and authenticated) end-to-end, so high-sensitivity users can be sure it
|
|
|
|
hasn't been read or modified. This even works for Internet services that
|
|
|
|
don't have built-in encryption and authentication, such as unencrypted
|
|
|
|
HTTP or chat, and it requires no modification of those services.
|
|
|
|
|
|
|
|
\subsection{Related work}
|
|
|
|
Tor is not the only anonymity system that aims to be practical and useful.
|
|
|
|
Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
|
|
|
|
open proxies around the Internet, can provide good
|
|
|
|
performance and some security against a weaker attacker. The Java
|
|
|
|
Anon Proxy~\cite{web-mix} provides similar functionality to Tor but only
|
|
|
|
handles web browsing rather than arbitrary TCP\@.
|
|
|
|
%Some peer-to-peer file-sharing overlay networks such as
|
|
|
|
%Freenet~\cite{freenet} and Mute~\cite{mute}
|
|
|
|
Zero-Knowledge Systems' commercial Freedom
|
|
|
|
network~\cite{freedom21-security} was even more flexible than Tor in
|
|
|
|
that it could transport arbitrary IP packets, and it also supported
|
|
|
|
pseudonymous access rather than just anonymous access; but it had
|
|
|
|
a different approach to sustainability (collecting money from users
|
2005-02-07 23:22:54 +01:00
|
|
|
and paying ISPs to run Tor nodes), and was shut down due to financial
|
2005-02-07 20:55:21 +01:00
|
|
|
load. Finally, potentially
|
|
|
|
more scalable designs like Tarzan~\cite{tarzan:ccs02} and
|
2005-02-07 06:52:49 +01:00
|
|
|
MorphMix~\cite{morphmix:fc04} have been proposed in the literature, but
|
2005-02-07 20:55:21 +01:00
|
|
|
have not yet been fielded. All of these systems differ somewhat
|
|
|
|
in threat model and presumably practical resistance to threats.
|
|
|
|
Morphmix is very close to Tor in circuit setup. And, by separating
|
|
|
|
node discovery from route selection from circuit setup, Tor is
|
|
|
|
flexible enough to potentially contain a Morphmix experiment within
|
|
|
|
it. We direct the interested reader to Section
|
2005-02-07 06:52:49 +01:00
|
|
|
2 of~\cite{tor-design} for a more in-depth review of related work.
|
|
|
|
|
|
|
|
Tor differs from other deployed systems for traffic analysis resistance
|
|
|
|
in its security and flexibility. Mix networks such as
|
|
|
|
Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
|
|
|
|
gain the highest degrees of anonymity at the expense of introducing highly
|
|
|
|
variable delays, thus making them unsuitable for applications such as web
|
|
|
|
browsing. Commercial single-hop
|
|
|
|
proxies~\cite{anonymizer} present a single point of failure, where
|
|
|
|
a single compromise can expose all users' traffic, and a single-point
|
|
|
|
eavesdropper can perform traffic analysis on the entire network.
|
|
|
|
Also, their proprietary implementations place any infrastucture that
|
|
|
|
depends on these single-hop solutions at the mercy of their providers'
|
|
|
|
financial health as well as network security.
|
|
|
|
|
|
|
|
%XXXX six-four. crowds. i2p.
|
|
|
|
|
|
|
|
%XXXX
|
2005-02-07 20:55:21 +01:00
|
|
|
%have a serious discussion of morphmix's assumptions, since they would
|
|
|
|
%seem to be the direct competition. in fact tor is a flexible architecture
|
|
|
|
%that would encompass morphmix, and they're nearly identical except for
|
|
|
|
%path selection and node discovery. and the trust system morphmix has
|
|
|
|
%seems overkill (and/or insecure) based on the threat model we've picked.
|
2005-02-07 06:52:49 +01:00
|
|
|
% this para should probably move to the scalability / directory system. -RD
|
2005-02-07 20:55:21 +01:00
|
|
|
% Nope. Cut for space, except for small comment added above -PFS
|
2005-01-30 02:13:29 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
\section{Social challenges}
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-07 06:52:49 +01:00
|
|
|
Many of the issues the Tor project needs to address extend beyond
|
|
|
|
system design and technology development. In particular, the
|
2005-01-26 06:29:08 +01:00
|
|
|
Tor project's \emph{image} with respect to its users and the rest of
|
|
|
|
the Internet impacts the security it can provide.
|
2005-02-07 06:52:49 +01:00
|
|
|
% No image, no sustainability -NM
|
2005-01-31 09:34:38 +01:00
|
|
|
With this image issue in mind, this section discusses the Tor user base and
|
2005-01-26 06:29:08 +01:00
|
|
|
Tor's interaction with other services on the Internet.
|
2005-01-31 09:34:38 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
\subsection{Communicating security}
|
2005-01-26 01:39:03 +01:00
|
|
|
|
2005-02-08 21:34:57 +01:00
|
|
|
Usability for anonymity systems
|
2005-02-01 11:31:14 +01:00
|
|
|
contributes directly to their security, because how usable the system
|
2005-02-08 06:43:12 +01:00
|
|
|
is impacts the possible anonymity set~\cite{econymics,back01}. Or
|
2005-02-01 11:31:14 +01:00
|
|
|
conversely, an unusable system attracts few users and thus can't provide
|
|
|
|
much anonymity.
|
|
|
|
|
|
|
|
This phenomenon has a second-order effect: knowing this, users should
|
|
|
|
choose which anonymity system to use based in part on how usable
|
|
|
|
\emph{others} will find it, in order to get the protection of a larger
|
|
|
|
anonymity set. Thus we might replace the adage ``usability is a security
|
|
|
|
parameter''~\cite{back01} with a new one: ``perceived usability is a
|
|
|
|
security parameter.'' From here we can better understand the effects
|
|
|
|
of publicity and advertising on security: the more convincing your
|
|
|
|
advertising, the more likely people will believe you have users, and thus
|
|
|
|
the more users you will attract. Perversely, over-hyped systems (if they
|
|
|
|
are not too broken) may be a better choice than modestly promoted ones,
|
|
|
|
if the hype attracts more users~\cite{usability-network-effect}.
|
|
|
|
|
|
|
|
So it follows that we should come up with ways to accurately communicate
|
|
|
|
the available security levels to the user, so she can make informed
|
2005-02-05 02:03:17 +01:00
|
|
|
decisions. JAP aims to do this by including a
|
2005-02-01 11:31:14 +01:00
|
|
|
comforting `anonymity meter' dial in the software's graphical interface,
|
|
|
|
giving the user an impression of the level of protection for her current
|
|
|
|
traffic.
|
|
|
|
|
|
|
|
However, there's a catch. For users to share the same anonymity set,
|
|
|
|
they need to act like each other. An attacker who can distinguish
|
|
|
|
a given user's traffic from the rest of the traffic will not be
|
2005-02-07 20:55:21 +01:00
|
|
|
distracted by anonymity set size. For high-latency systems like
|
2005-02-01 11:31:14 +01:00
|
|
|
Mixminion, where the threat model is based on mixing messages with each
|
|
|
|
other, there's an arms race between end-to-end statistical attacks and
|
|
|
|
counter-strategies~\cite{statistical-disclosure,minion-design,e2e-traffic,trickle02}.
|
|
|
|
But for low-latency systems like Tor, end-to-end \emph{traffic
|
2005-02-08 06:43:12 +01:00
|
|
|
correlation} attacks~\cite{danezis-pet2004,defensive-dropping,SS03}
|
2005-02-05 02:03:17 +01:00
|
|
|
allow an attacker who can measure both ends of a communication
|
|
|
|
to match packet timing and volume, quickly linking
|
2005-02-01 11:31:14 +01:00
|
|
|
the initiator to her destination. This is why Tor's threat model is
|
|
|
|
based on preventing the adversary from observing both the initiator and
|
|
|
|
the responder.
|
|
|
|
|
|
|
|
Like Tor, the current JAP implementation does not pad connections
|
|
|
|
(apart from using small fixed-size cells for transport). In fact,
|
2005-02-07 20:55:21 +01:00
|
|
|
JAP's cascade-based network topology may be even more vulnerable to these
|
2005-02-05 02:03:17 +01:00
|
|
|
attacks, because the network has fewer edges. JAP was born out of
|
2005-02-01 11:31:14 +01:00
|
|
|
the ISDN mix design~\cite{isdn-mixes}, where padding made sense because
|
2005-02-08 21:34:57 +01:00
|
|
|
every user had a fixed bandwidth allocation and altering the timing
|
|
|
|
pattern of packets could be immediately detected, but in its current context
|
2005-02-01 11:31:14 +01:00
|
|
|
as a general Internet web anonymizer, adding sufficient padding to JAP
|
2005-02-08 21:34:57 +01:00
|
|
|
would be prohibitively expensive and probably ineffective against a
|
|
|
|
minimally active attacker.\footnote{Even if JAP could
|
2005-02-08 06:43:12 +01:00
|
|
|
fund higher-capacity nodes indefinitely, our experience
|
2005-02-05 02:03:17 +01:00
|
|
|
suggests that many users would not accept the increased per-user
|
2005-02-01 11:31:14 +01:00
|
|
|
bandwidth requirements, leading to an overall much smaller user base. But
|
2005-02-08 21:34:57 +01:00
|
|
|
cf.\ Section~\ref{subsec:mid-latency}.} Therefore, since under this threat
|
2005-02-01 11:31:14 +01:00
|
|
|
model the number of concurrent users does not seem to have much impact
|
|
|
|
on the anonymity provided, we suggest that JAP's anonymity meter is not
|
2005-02-08 07:54:47 +01:00
|
|
|
accurately communicating security levels to its users.
|
2005-02-01 11:31:14 +01:00
|
|
|
|
2005-02-03 21:07:38 +01:00
|
|
|
% because more users don't help anonymity much, we need to rely more
|
|
|
|
% on other incentive schemes, both policy-based (see sec x) and
|
|
|
|
% technically enforced (see sec y)
|
|
|
|
|
2005-02-01 11:31:14 +01:00
|
|
|
On the other hand, while the number of active concurrent users may not
|
|
|
|
matter as much as we'd like, it still helps to have some other users
|
2005-02-08 08:54:28 +01:00
|
|
|
on the network. We investigate this issue next.
|
2005-01-26 06:29:08 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
\subsection{Reputability and perceived social value}
|
2005-02-01 11:31:14 +01:00
|
|
|
Another factor impacting the network's security is its reputability:
|
2005-02-05 02:03:17 +01:00
|
|
|
the perception of its social value based on its current user base. If Alice is
|
2005-02-01 11:31:14 +01:00
|
|
|
the only user who has ever downloaded the software, it might be socially
|
2005-02-05 02:03:17 +01:00
|
|
|
accepted, but she's not getting much anonymity. Add a thousand animal rights
|
|
|
|
activists, and she's anonymous, but everyone thinks she's a Bambi lover (or
|
2005-02-01 23:48:10 +01:00
|
|
|
NRA member if you prefer a contrasting example). Add a thousand
|
2005-02-07 20:55:21 +01:00
|
|
|
diverse citizens (cancer survivors, privacy enthusiasts, and so on)
|
2005-02-05 02:03:17 +01:00
|
|
|
and now she's harder to profile.
|
2005-01-31 09:34:38 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
Furthermore, the network's reputability affects its node base: more people
|
2005-02-07 08:44:06 +01:00
|
|
|
are willing to run a service if they believe it will be used by human rights
|
|
|
|
workers than if they believe it will be used exclusively for disreputable
|
2005-02-07 23:22:54 +01:00
|
|
|
ends. This effect becomes stronger if node operators themselves think they
|
2005-02-07 08:44:06 +01:00
|
|
|
will be associated with these disreputable ends.
|
|
|
|
|
|
|
|
So the more cancer survivors on Tor, the better for the human rights
|
|
|
|
activists. The more malicious hackers, the worse for the normal users. Thus,
|
2005-01-31 09:34:38 +01:00
|
|
|
reputability is an anonymity issue for two reasons. First, it impacts
|
|
|
|
the sustainability of the network: a network that's always about to be
|
2005-02-07 23:22:54 +01:00
|
|
|
shut down has difficulty attracting and keeping adquate nodes.
|
2005-02-07 20:55:21 +01:00
|
|
|
Second, a disreputable network is more vulnerable to legal and
|
2005-02-07 08:44:06 +01:00
|
|
|
political attacks, since it will attract fewer supporters.
|
2005-01-31 09:34:38 +01:00
|
|
|
|
|
|
|
While people therefore have an incentive for the network to be used for
|
|
|
|
``more reputable'' activities than their own, there are still tradeoffs
|
|
|
|
involved when it comes to anonymity. To follow the above example, a
|
2005-02-05 02:03:17 +01:00
|
|
|
network used entirely by cancer survivors might welcome some NRA members
|
|
|
|
onto the network, though of course they'd prefer a wider
|
2005-02-01 23:48:10 +01:00
|
|
|
variety of users.
|
2005-01-31 09:34:38 +01:00
|
|
|
|
2005-02-01 11:31:14 +01:00
|
|
|
Reputability becomes even more tricky in the case of privacy networks,
|
|
|
|
since the good uses of the network (such as publishing by journalists in
|
|
|
|
dangerous countries) are typically kept private, whereas network abuses
|
|
|
|
or other problems tend to be more widely publicized.
|
|
|
|
|
2005-01-31 09:34:38 +01:00
|
|
|
The impact of public perception on security is especially important
|
|
|
|
during the bootstrapping phase of the network, where the first few
|
|
|
|
widely publicized uses of the network can dictate the types of users it
|
|
|
|
attracts next.
|
2005-02-08 06:43:12 +01:00
|
|
|
As an example, some U.S.~Department of Energy
|
2005-02-07 08:44:06 +01:00
|
|
|
penetration testing engineers are tasked with compromising DoE computers
|
|
|
|
from the outside. They only have a limited number of ISPs from which to
|
|
|
|
launch their attacks, and they found that the defenders were recognizing
|
|
|
|
attacks because they came from the same IP space. These engineers wanted
|
|
|
|
to use Tor to hide their tracks. First, from a technical standpoint,
|
|
|
|
Tor does not support the variety of IP packets one would like to use in
|
|
|
|
such attacks (see Section~\ref{subsec:tcp-vs-ip}). But aside from this,
|
|
|
|
we also decided that it would probably be poor precedent to encourage
|
|
|
|
such use---even legal use that improves national security---and managed
|
|
|
|
to dissuade them.
|
|
|
|
|
2005-02-02 00:57:07 +01:00
|
|
|
%% "outside of academia, jap has just lost, permanently". (That is,
|
|
|
|
%% even though the crime detection issues are resolved and are unlikely
|
|
|
|
%% to go down the same way again, public perception has not been kind.)
|
|
|
|
|
|
|
|
\subsection{Sustainability and incentives}
|
2005-02-05 02:03:17 +01:00
|
|
|
One of the unsolved problems in low-latency anonymity designs is
|
2005-02-07 20:55:21 +01:00
|
|
|
how to keep the nodes running. Zero-Knowledge Systems's Freedom network
|
2005-02-02 00:57:07 +01:00
|
|
|
depended on paying third parties to run its servers; the JAP project's
|
2005-02-05 02:03:17 +01:00
|
|
|
bandwidth depends on grants to pay for its bandwidth and
|
2005-02-02 00:57:07 +01:00
|
|
|
administrative expenses. In Tor, bandwidth and administrative costs are
|
2005-02-05 02:03:17 +01:00
|
|
|
distributed across the volunteers who run Tor nodes, so we at least have
|
2005-02-02 00:57:07 +01:00
|
|
|
reason to think that the Tor network could survive without continued research
|
|
|
|
funding.\footnote{It also helps that Tor is implemented with free and open
|
|
|
|
source software that can be maintained by anybody with the ability and
|
|
|
|
inclination.} But why are these volunteers running nodes, and what can we
|
|
|
|
do to encourage more volunteers to do so?
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
We have not formally surveyed Tor node operators to learn why they are
|
2005-02-07 23:22:54 +01:00
|
|
|
running nodes, but
|
2005-02-02 00:57:07 +01:00
|
|
|
from the information they have provided, it seems that many of them run Tor
|
|
|
|
nodes for reasons of personal interest in privacy issues. It is possible
|
2005-02-07 20:55:21 +01:00
|
|
|
that others are running Tor for their own
|
|
|
|
anonymity reasons, but of course they are
|
|
|
|
hardly likely to tell us specifics if they are.
|
|
|
|
%Significantly, Tor's threat model changes the anonymity incentives for running
|
2005-02-07 23:22:54 +01:00
|
|
|
%a node. In a high-latency mix network, users can receive additional
|
|
|
|
%anonymity by running their own node, since doing so obscures when they are
|
2005-02-07 20:55:21 +01:00
|
|
|
%injecting messages into the network. But, anybody observing all I/O to a Tor
|
2005-02-07 23:22:54 +01:00
|
|
|
%node can tell when the node is generating traffic that corresponds to
|
2005-02-07 20:55:21 +01:00
|
|
|
%none of its incoming traffic.
|
|
|
|
%
|
|
|
|
%I didn't buy the above for reason's subtle enough that I just cut it -PFS
|
|
|
|
Tor exit node operators do attain a degree of
|
|
|
|
``deniability'' for traffic that originates at that exit node. For
|
|
|
|
example, it is likely in practice that HTTP requests from a Tor node's IP
|
|
|
|
will be assumed to be from the Tor network.
|
|
|
|
More significantly, people and organizations who use Tor for
|
|
|
|
anonymity depend on the
|
2005-02-07 23:22:54 +01:00
|
|
|
continued existence of the Tor network to do so; running a node helps to
|
2005-02-07 08:44:06 +01:00
|
|
|
keep the network operational.
|
2005-02-07 23:22:54 +01:00
|
|
|
%\item Local Tor entry and exit nodes allow users on a network to run in an
|
2005-02-07 06:52:49 +01:00
|
|
|
% `enclave' configuration. [XXXX need to resolve this. They would do this
|
|
|
|
% for E2E encryption + auth?]
|
2005-02-01 11:31:14 +01:00
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
|
|
|
|
%We must try to make the costs of running a Tor node easily minimized.
|
2005-02-02 00:57:07 +01:00
|
|
|
Since Tor is run by volunteers, the most crucial software usability issue is
|
|
|
|
usability by operators: when an operator leaves, the network becomes less
|
|
|
|
usable by everybody. To keep operators pleased, we must try to keep Tor's
|
2005-02-07 08:44:06 +01:00
|
|
|
resource and administrative demands as low as possible.
|
2005-02-02 00:57:07 +01:00
|
|
|
|
|
|
|
Because of ISP billing structures, many Tor operators have underused capacity
|
|
|
|
that they are willing to donate to the network, at no additional monetary
|
|
|
|
cost to them. Features to limit bandwidth have been essential to adoption.
|
2005-02-07 23:22:54 +01:00
|
|
|
Also useful has been a ``hibernation'' feature that allows a Tor node that
|
2005-02-02 00:57:07 +01:00
|
|
|
wants to provide high bandwidth, but no more than a certain amount in a
|
|
|
|
giving billing cycle, to become dormant once its bandwidth is exhausted, and
|
|
|
|
to reawaken at a random offset into the next billing cycle. This feature has
|
|
|
|
interesting policy implications, however; see
|
2005-02-08 21:34:57 +01:00
|
|
|
the next section below.
|
2005-02-07 08:44:06 +01:00
|
|
|
Exit policies help to limit administrative costs by limiting the frequency of
|
2005-02-08 21:34:57 +01:00
|
|
|
abuse complaints. (See Section~\ref{subsec:tor-and-blacklists}.)
|
2005-02-02 00:57:07 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
%[XXXX say more. Why else would you run a node? What else can we do/do we
|
|
|
|
% already do to make running a node more attractive?]
|
2005-02-07 08:44:06 +01:00
|
|
|
%[We can enforce incentives; see Section 6.1. We can rate-limit clients.
|
2005-02-07 23:22:54 +01:00
|
|
|
% We can put "top bandwidth nodes lists" up a la seti@home.]
|
2005-02-02 00:57:07 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
|
2005-02-08 06:43:12 +01:00
|
|
|
\subsection{Bandwidth and file-sharing}
|
|
|
|
\label{subsec:bandwidth-and-file-sharing}
|
2005-02-07 08:44:06 +01:00
|
|
|
%One potentially problematical area with deploying Tor has been our response
|
|
|
|
%to file-sharing applications.
|
2005-02-02 00:57:07 +01:00
|
|
|
Once users have configured their applications to work with Tor, the largest
|
2005-02-08 02:40:19 +01:00
|
|
|
remaining usability issue is performance. Users begin to suffer
|
2005-02-07 20:55:21 +01:00
|
|
|
when websites ``feel slow''.
|
2005-02-07 23:22:54 +01:00
|
|
|
Clients currently try to build their connections through nodes that they
|
2005-02-02 00:57:07 +01:00
|
|
|
guess will have enough bandwidth. But even if capacity is allocated
|
|
|
|
optimally, it seems unlikely that the current network architecture will have
|
|
|
|
enough capacity to provide every user with as much bandwidth as she would
|
2005-02-07 23:22:54 +01:00
|
|
|
receive if she weren't using Tor, unless far more nodes join the network
|
2005-02-02 00:57:07 +01:00
|
|
|
(see above).
|
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
%Limited capacity does not destroy the network, however. Instead, usage tends
|
|
|
|
%towards an equilibrium: when performance suffers, users who value performance
|
|
|
|
%over anonymity tend to leave the system, thus freeing capacity until the
|
|
|
|
%remaining users on the network are exactly those willing to use that capacity
|
|
|
|
%there is.
|
2005-02-07 06:52:49 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
Much of Tor's recent bandwidth difficulties have come from file-sharing
|
|
|
|
applications. These applications provide two challenges to
|
2005-02-02 00:57:07 +01:00
|
|
|
any anonymizing network: their intensive bandwidth requirement, and the
|
|
|
|
degree to which they are associated (correctly or not) with copyright
|
|
|
|
violation.
|
|
|
|
|
|
|
|
As noted above, high-bandwidth protocols can make the network unresponsive,
|
|
|
|
but tend to be somewhat self-correcting. Issues of copyright violation,
|
|
|
|
however, are more interesting. Typical exit node operators want to help
|
2005-02-05 02:03:17 +01:00
|
|
|
people achieve private and anonymous speech, not to help people (say) host
|
|
|
|
Vin Diesel movies for download; and typical ISPs would rather not
|
2005-02-02 00:57:07 +01:00
|
|
|
deal with customers who incur them the overhead of getting menacing letters
|
2005-02-07 20:55:21 +01:00
|
|
|
from the MPAA\@. While it is quite likely that the operators are doing nothing
|
2005-02-02 00:57:07 +01:00
|
|
|
illegal, many ISPs have policies of dropping users who get repeated legal
|
|
|
|
threats regardless of the merits of those threats, and many operators would
|
|
|
|
prefer to avoid receiving legal threats even if those threats have little
|
|
|
|
merit. So when the letters arrive, operators are likely to face
|
2005-02-08 06:43:12 +01:00
|
|
|
pressure to block file-sharing applications entirely, in order to avoid the
|
2005-02-02 00:57:07 +01:00
|
|
|
hassle.
|
|
|
|
|
2005-02-08 06:43:12 +01:00
|
|
|
But blocking file-sharing would not necessarily be easy; most popular
|
2005-02-02 00:57:07 +01:00
|
|
|
protocols have evolved to run on a variety of non-standard ports in order to
|
|
|
|
get around other port-based bans. Thus, exit node operators who wanted to
|
2005-02-08 06:43:12 +01:00
|
|
|
block file-sharing would have to find some way to integrate Tor with a
|
2005-02-02 00:57:07 +01:00
|
|
|
protocol-aware exit filter. This could be a technically expensive
|
|
|
|
undertaking, and one with poor prospects: it is unlikely that Tor exit nodes
|
|
|
|
would succeed where so many institutional firewalls have failed. Another
|
2005-02-07 23:22:54 +01:00
|
|
|
possibility for sensitive operators is to run a restrictive node that
|
2005-02-05 02:03:17 +01:00
|
|
|
only permits exit connections to a restricted range of ports which are
|
2005-02-02 00:57:07 +01:00
|
|
|
not frequently associated with file sharing. There are increasingly few such
|
|
|
|
ports.
|
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
Other possible approaches might include rate-limiting connections, especially
|
|
|
|
long-lived connections or connections to file-sharing ports, so that
|
|
|
|
high-bandwidth connections do not flood the network. We might also want to
|
|
|
|
give priority to cells on low-bandwidth connections to keep them interactive,
|
|
|
|
but this could have negative anonymity implications.
|
|
|
|
|
2005-02-02 00:57:07 +01:00
|
|
|
For the moment, it seems that Tor's bandwidth issues have rendered it
|
|
|
|
unattractive for bulk file-sharing traffic; this may continue to be so in the
|
|
|
|
future. Nevertheless, Tor will likely remain attractive for limited use in
|
2005-02-08 06:43:12 +01:00
|
|
|
file-sharing protocols that have separate control and data channels.
|
2005-02-02 00:57:07 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
%[We should say more -- but what? That we'll see a similar
|
|
|
|
% equilibriating effect as with bandwidth, where sensitive ops switch to
|
2005-02-08 06:43:12 +01:00
|
|
|
% middleman, and we become less useful for file-sharing, so the file-sharing
|
|
|
|
% people back off, so we get more ops since there's less file-sharing, so the
|
|
|
|
% file-sharers come back, etc.]
|
2005-01-26 06:29:08 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
%XXXX
|
|
|
|
%in practice, plausible deniability is hypothetical and doesn't seem very
|
|
|
|
%convincing. if ISPs find the activity antisocial, they don't care *why*
|
|
|
|
%your computer is doing that behavior.
|
2005-02-07 06:52:49 +01:00
|
|
|
|
2005-01-26 06:29:08 +01:00
|
|
|
\subsection{Tor and blacklists}
|
2005-02-08 21:34:57 +01:00
|
|
|
\label{subsec:tor-and-blacklists}
|
2005-01-26 06:29:08 +01:00
|
|
|
|
2005-01-27 02:16:52 +01:00
|
|
|
It was long expected that, alongside Tor's legitimate users, it would also
|
|
|
|
attract troublemakers who exploited Tor in order to abuse services on the
|
2005-02-07 08:44:06 +01:00
|
|
|
Internet with vandalism, rude mail, and so on.
|
|
|
|
%[XXX we're not talking bandwidth abuse here, we're talking vandalism,
|
|
|
|
%hate mails via hotmail, attacks, etc.]
|
2005-02-05 02:03:17 +01:00
|
|
|
Our initial answer to this situation was to use ``exit policies''
|
2005-02-07 23:22:54 +01:00
|
|
|
to allow individual Tor nodes to block access to specific IP/port ranges.
|
2005-02-08 11:27:47 +01:00
|
|
|
This approach aims to make operators more willing to run Tor by allowing
|
2005-02-07 23:22:54 +01:00
|
|
|
them to prevent their nodes from being used for abusing particular
|
2005-02-07 20:55:21 +01:00
|
|
|
services. For example, all Tor nodes currently block SMTP (port 25), in
|
2005-01-27 02:16:52 +01:00
|
|
|
order to avoid being used to send spam.
|
|
|
|
|
|
|
|
This approach is useful, but is insufficient for two reasons. First, since
|
2005-02-07 23:22:54 +01:00
|
|
|
it is not possible to force all nodes to block access to any given service,
|
2005-01-27 02:16:52 +01:00
|
|
|
many of those services try to block Tor instead. More broadly, while being
|
|
|
|
blockable is important to being good netizens, we would like to encourage
|
|
|
|
services to allow anonymous access; services should not need to decide
|
|
|
|
between blocking legitimate anonymous use and allowing unlimited abuse.
|
|
|
|
|
2005-01-26 23:14:25 +01:00
|
|
|
This is potentially a bigger problem than it may appear.
|
2005-02-07 20:55:21 +01:00
|
|
|
On the one hand, if people want to refuse connections from your address to
|
|
|
|
their servers it would seem that they should be allowed. But, it's not just
|
2005-02-07 23:22:54 +01:00
|
|
|
for himself that the individual node administrator is deciding when he decides
|
2005-02-07 20:55:21 +01:00
|
|
|
if he wants to post to Wikipedia from his Tor node address or allow
|
2005-02-01 23:48:10 +01:00
|
|
|
people to read Wikipedia anonymously through his Tor node. (Wikipedia
|
2005-02-04 19:32:40 +01:00
|
|
|
has blocked all posting from all Tor nodes based on IP address.) If e.g.,
|
2005-01-26 23:14:25 +01:00
|
|
|
s/he comes through a campus or corporate NAT, then the decision must
|
|
|
|
be to have the entire population behind it able to have a Tor exit
|
2005-02-07 20:55:21 +01:00
|
|
|
node or to have write access to Wikipedia. This is a loss for both Tor
|
|
|
|
and Wikipedia. We don't want to compete for (or divvy up) the NAT
|
2005-01-26 23:14:25 +01:00
|
|
|
protected entities of the world.
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
Worse, many IP blacklists are not terribly fine-grained.
|
2005-02-08 21:34:57 +01:00
|
|
|
No current IP blacklist, for example, allows a service provider to blacklist
|
2005-02-07 23:22:54 +01:00
|
|
|
only those Tor nodes that allow access to a specific IP or port, even
|
2005-01-27 02:16:52 +01:00
|
|
|
though this information is readily available. One IP blacklist even bans
|
2005-02-07 23:22:54 +01:00
|
|
|
every class C network that contains a Tor node, and recommends banning SMTP
|
2005-02-07 08:44:06 +01:00
|
|
|
from these networks even though Tor does not allow SMTP at all. This
|
|
|
|
coarse-grained approach is typically a strategic decision to discourage the
|
|
|
|
operation of anything resembling an open proxy by encouraging its neighbors
|
2005-02-07 20:55:21 +01:00
|
|
|
to shut it down in order to get unblocked themselves.
|
2005-02-07 08:44:06 +01:00
|
|
|
%[****Since this is stupid and we oppose it, shouldn't we name names here -pfs]
|
|
|
|
%[XXX also, they're making \emph{middleman nodes leave} because they're caught
|
|
|
|
% up in the standoff!]
|
|
|
|
%[XXX Mention: it's not dumb, it's strategic!]
|
|
|
|
%[XXX Mention: for some servops, any blacklist is a blacklist too many,
|
2005-02-08 02:40:19 +01:00
|
|
|
% because it is risky. (Guy lives in apt _building_ with one IP.)]
|
2005-01-27 02:16:52 +01:00
|
|
|
|
|
|
|
Problems of abuse occur mainly with services such as IRC networks and
|
2005-02-01 23:48:10 +01:00
|
|
|
Wikipedia, which rely on IP blocking to ban abusive users. While at first
|
2005-01-27 02:16:52 +01:00
|
|
|
blush this practice might seem to depend on the anachronistic assumption that
|
|
|
|
each IP is an identifier for a single user, it is actually more reasonable in
|
|
|
|
practice: it assumes that non-proxy IPs are a costly resource, and that an
|
2005-02-07 23:22:54 +01:00
|
|
|
abuser can not change IPs at will. By blocking IPs which are used by Tor
|
|
|
|
nodes, open proxies, and service abusers, these systems hope to make
|
2005-01-27 02:16:52 +01:00
|
|
|
ongoing abuse difficult. Although the system is imperfect, it works
|
|
|
|
tolerably well for them in practice.
|
|
|
|
|
|
|
|
But of course, we would prefer that legitimate anonymous users be able to
|
|
|
|
access abuse-prone services. One conceivable approach would be to require
|
|
|
|
would-be IRC users, for instance, to register accounts if they wanted to
|
2005-02-08 21:34:57 +01:00
|
|
|
access the IRC network from Tor. In practise this would not
|
2005-01-27 02:16:52 +01:00
|
|
|
significantly impede abuse if creating new accounts were easily automatable;
|
|
|
|
this is why services use IP blocking. In order to deter abuse, pseudonymous
|
2005-02-05 02:03:17 +01:00
|
|
|
identities need to require a significant switching cost in resources or human
|
2005-01-27 02:16:52 +01:00
|
|
|
time.
|
2005-02-07 08:44:06 +01:00
|
|
|
% XXX Mention captchas?
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-05 02:03:17 +01:00
|
|
|
%One approach, similar to that taken by Freedom, would be to bootstrap some
|
|
|
|
%non-anonymous costly identification mechanism to allow access to a
|
|
|
|
%blind-signature pseudonym protocol. This would effectively create costly
|
|
|
|
%pseudonyms, which services could require in order to allow anonymous access.
|
|
|
|
%This approach has difficulties in practise, however:
|
|
|
|
%\begin{tightlist}
|
|
|
|
%\item Unlike Freedom, Tor is not a commercial service. Therefore, it would
|
|
|
|
% be a shame to require payment in order to make Tor useful, or to make
|
|
|
|
% non-paying users second-class citizens.
|
|
|
|
%\item It is hard to think of an underlying resource that would actually work.
|
|
|
|
% We could use IP addresses, but that's the problem, isn't it?
|
|
|
|
%\item Managing single sign-on services is not considered a well-solved
|
|
|
|
% problem in practice. If Microsoft can't get universal acceptance for
|
|
|
|
% Passport, why do we think that a Tor-specific solution would do any good?
|
|
|
|
%\item Even if we came up with a perfect authentication system for our needs,
|
|
|
|
% there's no guarantee that any service would actually start using it. It
|
|
|
|
% would require a nonzero effort for them to support it, and it might just
|
|
|
|
% be less hassle for them to block tor anyway.
|
|
|
|
%\end{tightlist}
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
%The use of squishy IP-based ``authentication'' and ``authorization''
|
|
|
|
%has not broken down even to the level that SSNs used for these
|
|
|
|
%purposes have in commercial and public record contexts. Externalities
|
|
|
|
%and misplaced incentives cause a continued focus on fighting identity
|
|
|
|
%theft by protecting SSNs rather than developing better authentication
|
|
|
|
%and incentive schemes \cite{price-privacy}. Similarly we can expect a
|
|
|
|
%continued use of identification by IP number as long as there is no
|
|
|
|
%workable alternative.
|
2005-02-01 23:48:10 +01:00
|
|
|
|
2005-02-07 08:44:06 +01:00
|
|
|
%[XXX Mention correct DNS-RBL implementation. -NM]
|
2005-02-07 06:52:49 +01:00
|
|
|
|
2005-02-08 08:37:30 +01:00
|
|
|
\section{Design choices}
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
In addition to social issues, Tor also faces some design tradeoffs that must
|
|
|
|
be investigated as the network develops.
|
2005-02-07 06:52:49 +01:00
|
|
|
|
2005-01-25 11:38:09 +01:00
|
|
|
\subsection{Transporting the stream vs transporting the packets}
|
2005-02-01 23:48:10 +01:00
|
|
|
\label{subsec:stream-vs-packet}
|
2005-02-01 12:39:54 +01:00
|
|
|
\label{subsec:tcp-vs-ip}
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-02-08 02:40:19 +01:00
|
|
|
Tor transports streams; it does not tunnel packets.
|
|
|
|
Developers of the old Freedom network~\cite{freedom21-security}
|
|
|
|
keep telling us that IP addresses should ``obviously'' be anonymized
|
|
|
|
at the IP layer. These issues need to be resolved before
|
|
|
|
Tor will be ready to carry arbitrary IP traffic:
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-01-26 11:46:53 +01:00
|
|
|
\begin{enumerate}
|
|
|
|
\setlength{\itemsep}{0mm}
|
|
|
|
\setlength{\parsep}{0mm}
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{IP packets reveal OS characteristics.} We still need to do
|
2005-01-26 11:46:53 +01:00
|
|
|
IP-level packet normalization, to stop things like IP fingerprinting
|
2005-02-01 12:39:54 +01:00
|
|
|
attacks. There likely exist libraries that can help with this.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{Application-level streams still need scrubbing.} We still need
|
2005-01-26 11:46:53 +01:00
|
|
|
Tor to be easy to integrate with user-level application-specific proxies
|
|
|
|
such as Privoxy. So it's not just a matter of capturing packets and
|
|
|
|
anonymizing them at the IP layer.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{Certain protocols will still leak information.} For example,
|
2005-02-08 06:43:12 +01:00
|
|
|
we must rewrite DNS requests so they are
|
|
|
|
delivered to an unlinkable DNS server; so we must
|
|
|
|
understand the protocols we are transporting.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{The crypto is unspecified.} First we need a block-level encryption
|
2005-01-26 11:46:53 +01:00
|
|
|
approach that can provide security despite
|
2005-01-25 11:38:09 +01:00
|
|
|
packet loss and out-of-order delivery. Freedom allegedly had one, but it was
|
2005-02-07 07:46:49 +01:00
|
|
|
never publicly specified.
|
2005-02-01 12:39:54 +01:00
|
|
|
Also, TLS over UDP is not implemented or even
|
|
|
|
specified, though some early work has begun on that~\cite{dtls}.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{We'll still need to tune network parameters}. Since the above
|
2005-02-01 12:39:54 +01:00
|
|
|
encryption system will likely need sequence numbers (and maybe more) to do
|
2005-02-07 20:55:21 +01:00
|
|
|
replay detection, handle duplicate frames, etc., we will be reimplementing
|
2005-02-08 02:40:19 +01:00
|
|
|
a subset of TCP anyway.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{Exit policies for arbitrary IP packets mean building a secure
|
2005-02-07 20:55:21 +01:00
|
|
|
IDS\@.} Our node operators tell us that exit policies are one of
|
2005-02-01 12:39:54 +01:00
|
|
|
the main reasons they're willing to run Tor.
|
|
|
|
Adding an Intrusion Detection System to handle exit policies would
|
2005-01-26 11:46:53 +01:00
|
|
|
increase the security complexity of Tor, and would likely not work anyway,
|
2005-01-26 12:09:57 +01:00
|
|
|
as evidenced by the entire field of IDS and counter-IDS papers. Many
|
|
|
|
potential abuse issues are resolved by the fact that Tor only transports
|
|
|
|
valid TCP streams (as opposed to arbitrary IP including malformed packets
|
|
|
|
and IP floods), so exit policies become even \emph{more} important as
|
2005-02-08 02:40:19 +01:00
|
|
|
we become able to transport IP packets. We also need to compactly
|
|
|
|
describe exit policies so clients can predict
|
2005-01-26 12:09:57 +01:00
|
|
|
which nodes will allow which packets to exit.
|
2005-01-27 05:51:56 +01:00
|
|
|
\item \emph{The Tor-internal name spaces would need to be redesigned.} We
|
2005-01-29 08:25:44 +01:00
|
|
|
support hidden service {\tt{.onion}} addresses, and other special addresses
|
2005-02-07 20:55:21 +01:00
|
|
|
like {\tt{.exit}} for the user to request a particular exit node,
|
2005-02-04 19:32:40 +01:00
|
|
|
by intercepting the addresses when they are passed to the Tor client.
|
2005-01-26 11:46:53 +01:00
|
|
|
\end{enumerate}
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-02-08 02:40:19 +01:00
|
|
|
This list is discouragingly long, but being able to transport more
|
|
|
|
protocols obviously has some advantages. It would be good to learn which
|
|
|
|
items are actual roadblocks and which are easier to resolve than we think.
|
2005-01-26 12:09:57 +01:00
|
|
|
|
2005-02-08 02:40:19 +01:00
|
|
|
To be fair, Tor's stream-based approach has run into
|
2005-02-07 07:46:49 +01:00
|
|
|
stumbling blocks as well. While Tor supports the SOCKS protocol,
|
|
|
|
which provides a standardized interface for generic TCP proxies, many
|
2005-02-08 02:40:19 +01:00
|
|
|
applications do not support SOCKS\@. For them we must
|
|
|
|
replace the networking system calls with SOCKS-aware
|
|
|
|
versions, or run a SOCKS tunnel locally, neither of which is
|
|
|
|
easy for the average user. %---even with good instructions.
|
2005-02-07 07:46:49 +01:00
|
|
|
Even when applications do use SOCKS, they often make DNS requests
|
2005-02-08 02:40:19 +01:00
|
|
|
themselves before handing the address to Tor, which advertises
|
|
|
|
where the user is about to connect.
|
|
|
|
We are still working on usable solutions.
|
|
|
|
|
|
|
|
%So in order to actually provide good anonymity, we need to make sure that
|
|
|
|
%users have a practical way to use Tor anonymously. Possibilities include
|
|
|
|
%writing wrappers for applications to anonymize them automatically; improving
|
|
|
|
%the applications' support for SOCKS; writing libraries to help application
|
|
|
|
%writers use Tor properly; and implementing a local DNS proxy to reroute DNS
|
|
|
|
%requests to Tor so that applications can simply point their DNS resolvers at
|
|
|
|
%localhost and continue to use SOCKS for data only.
|
2005-02-07 07:46:49 +01:00
|
|
|
|
2005-01-25 11:38:09 +01:00
|
|
|
\subsection{Mid-latency}
|
2005-01-29 02:05:09 +01:00
|
|
|
\label{subsec:mid-latency}
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-02-07 07:46:49 +01:00
|
|
|
Some users need to resist traffic correlation attacks. Higher-latency
|
2005-02-08 06:43:12 +01:00
|
|
|
mix-networks introduce variability into message
|
2005-02-07 07:46:49 +01:00
|
|
|
arrival times: as timing variance increases, timing correlation attacks
|
|
|
|
require increasingly more data~\cite{e2e-traffic}. Can we improve Tor's
|
2005-02-08 06:43:12 +01:00
|
|
|
resistance without losing too much usability?
|
2005-02-07 07:46:49 +01:00
|
|
|
|
2005-02-08 06:43:12 +01:00
|
|
|
We need to learn whether we can trade a small increase in latency
|
2005-02-07 07:46:49 +01:00
|
|
|
for a large anonymity increase, or if we'll end up trading a lot of
|
2005-02-08 06:43:12 +01:00
|
|
|
latency for a small security gain. A trade could be worthwhile even if we
|
2005-02-07 07:46:49 +01:00
|
|
|
can only protect certain use cases, such as infrequent short-duration
|
2005-02-08 06:43:12 +01:00
|
|
|
transactions. % To answer this question
|
|
|
|
We might adapt the techniques of~\cite{e2e-traffic} to a lower-latency mix
|
|
|
|
network, where the messages are batches of cells in temporally clustered
|
|
|
|
connections. These large fixed-size batches can also help resist volume
|
|
|
|
signature attacks~\cite{hintz-pet02}. We can also experiment with traffic
|
|
|
|
shaping to get a good balance of throughput and security.
|
|
|
|
%Other padding regimens might supplement the
|
|
|
|
%mid-latency option; however, we should continue the caution with which
|
|
|
|
%we have always approached padding lest the overhead cost us too much
|
|
|
|
%performance or too many volunteers.
|
|
|
|
|
|
|
|
We must keep usability in mind too. How much can latency increase
|
|
|
|
before we drive away our users? We're already being forced to increase
|
|
|
|
latency slightly, as our growing network incorporates more DSL and
|
|
|
|
cable-modem nodes and more nodes in distant continents. Perhaps we can
|
|
|
|
harness this increased latency to improve anonymity rather than just
|
|
|
|
reduce usability. Further, if we let clients label certain circuits as
|
|
|
|
mid-latency as they are constructed, we could handle both types of traffic
|
2005-02-08 21:34:57 +01:00
|
|
|
on the same network, giving users a choice between speed and security---and
|
|
|
|
giving researchers a chance to experiment with parameters to improve the
|
|
|
|
quality of those choices.
|
2005-01-30 23:02:13 +01:00
|
|
|
|
2005-02-08 11:27:47 +01:00
|
|
|
\subsection{Enclaves and helper nodes}
|
2005-02-07 20:55:21 +01:00
|
|
|
\label{subsec:helper-nodes}
|
2005-02-01 23:48:10 +01:00
|
|
|
|
2005-02-08 11:27:47 +01:00
|
|
|
It has long been thought that the best anonymity comes from running your
|
2005-02-08 21:34:57 +01:00
|
|
|
own node~\cite{tor-design,or-ih96,or-pet00}. This is called using Tor in an
|
|
|
|
\emph{enclave} configuration. By running Tor clients only on Tor nodes
|
|
|
|
at the enclave perimeter, enclave configuration can also permit anonymity
|
|
|
|
protection even when policy or other requiremnts prevent individual machines
|
|
|
|
within the enclave from running Tor clients~\cite{or-jsac98,or-discex00}.
|
|
|
|
|
|
|
|
Of course, Tor's default path length of
|
2005-02-08 11:27:47 +01:00
|
|
|
three is insufficient for these enclaves, since the entry and/or exit
|
|
|
|
themselves are sensitive. Tor thus increments the path length by one
|
|
|
|
for each sensitive endpoint in the circuit.
|
|
|
|
Enclaves also help to protect against end-to-end attacks, since it's
|
|
|
|
possible that traffic coming from the node has simply been relayed from
|
|
|
|
elsewhere. However, if the node has recognizable behavior patterns,
|
|
|
|
an attacker who runs nodes in the network can triangulate over time to
|
|
|
|
gain confidence that it is in fact originating the traffic. Wright et
|
|
|
|
al.~\cite{wright03} introduce the notion of a \emph{helper node}---a
|
|
|
|
single fixed entry node for each user---to combat this \emph{predecessor
|
|
|
|
attack}.
|
|
|
|
|
|
|
|
However, the attack in~\cite{attack-tor-oak05} shows that simply adding
|
|
|
|
to the path length, or using a helper node, may not protect an enclave
|
|
|
|
node. A hostile web server can send constant interference traffic to
|
|
|
|
all nodes in the network, and learn which nodes are involved in the
|
|
|
|
circuit (though at least in the current attack, he can't learn their
|
|
|
|
order). Using randomized path lengths may help some, since the attacker
|
|
|
|
will never be certain he has identified all nodes in the path, but as
|
|
|
|
long as the network remains small this attack will still be feasible.
|
|
|
|
|
2005-02-08 11:46:55 +01:00
|
|
|
Helper nodes also aim to help Tor clients, because choosing entry and exit points
|
2005-02-08 11:27:47 +01:00
|
|
|
randomly and changing them frequently allows an attacker who controls
|
|
|
|
even a few nodes to eventually link some of their destinations. The goal
|
|
|
|
is to take the risk once and for all about choosing a bad entry node,
|
|
|
|
rather than taking a new risk for each new circuit. (Choosing fixed
|
|
|
|
exit nodes is less useful, since even an honest exit node still doesn't
|
|
|
|
protect against a hostile website.) But obstacles still remain before
|
2005-02-08 11:46:55 +01:00
|
|
|
we can implement them.
|
2005-02-08 11:27:47 +01:00
|
|
|
For one, the literature does not describe how to choose helpers from a list
|
2005-02-07 23:22:54 +01:00
|
|
|
of nodes that changes over time. If Alice is forced to choose a new entry
|
2005-02-08 11:27:47 +01:00
|
|
|
helper every $d$ days and $c$ of the $n$ nodes are bad, she can expect
|
|
|
|
to choose a compromised node around
|
2005-02-07 23:22:54 +01:00
|
|
|
every $dc/n$ days. Statistically over time this approach only helps
|
|
|
|
if she is better at choosing honest helper nodes than at choosing
|
|
|
|
honest nodes. Worse, an attacker with the ability to DoS nodes could
|
2005-02-08 11:27:47 +01:00
|
|
|
force users to switch helper nodes more frequently and/or remove
|
2005-02-07 23:22:54 +01:00
|
|
|
other candidate helpers.
|
2005-02-03 20:06:09 +01:00
|
|
|
|
|
|
|
%Do general DoS attacks have anonymity implications? See e.g. Adam
|
|
|
|
%Back's IH paper, but I think there's more to be pointed out here. -RD
|
|
|
|
% Not sure what you want to say here. -NM
|
|
|
|
|
|
|
|
%Game theory for helper nodes: if Alice offers a hidden service on a
|
|
|
|
%server (enclave model), and nobody ever uses helper nodes, then against
|
|
|
|
%George+Steven's attack she's totally nailed. If only Alice uses a helper
|
|
|
|
%node, then she's still identified as the source of the data. If everybody
|
|
|
|
%uses a helper node (including Alice), then the attack identifies the
|
|
|
|
%helper node and also Alice, and knows which one is which. If everybody
|
|
|
|
%uses a helper node (but not Alice), then the attacker figures the real
|
|
|
|
%source was a client that is using Alice as a helper node. [How's my
|
|
|
|
%logic here?] -RD
|
|
|
|
%
|
|
|
|
% Not sure about the logic. For the attack to work with helper nodes, the
|
|
|
|
%attacker needs to guess that Alice is running the hidden service, right?
|
|
|
|
%Otherwise, how can he know to measure her traffic specifically? -NM
|
2005-02-08 11:27:47 +01:00
|
|
|
%
|
|
|
|
% In the Murdoch-Danezis attack, the adversary measures all servers. -RD
|
2005-01-30 02:13:29 +01:00
|
|
|
|
2005-02-03 20:06:09 +01:00
|
|
|
%point to routing-zones section re: helper nodes to defend against
|
|
|
|
%big stuff.
|
2005-01-30 02:13:29 +01:00
|
|
|
|
2005-01-25 11:38:09 +01:00
|
|
|
\subsection{Location-hidden services}
|
2005-02-04 19:32:40 +01:00
|
|
|
\label{subsec:hidden-services}
|
2005-01-25 11:38:09 +01:00
|
|
|
|
2005-02-08 11:27:47 +01:00
|
|
|
Tor's \emph{rendezvous points}
|
2005-02-03 21:07:38 +01:00
|
|
|
let users provide TCP services to other Tor users without revealing
|
2005-02-08 11:27:47 +01:00
|
|
|
the service's location. Since this feature is relatively recent, we describe here
|
2005-02-03 21:07:38 +01:00
|
|
|
a couple of our early observations from its deployment.
|
|
|
|
|
|
|
|
First, our implementation of hidden services seems less hidden than we'd
|
|
|
|
like, since they are configured on a single client and get used over
|
|
|
|
and over---particularly because an external adversary can induce them to
|
|
|
|
produce traffic. They seem the ideal use case for our above discussion
|
|
|
|
of helper nodes. This insecurity means that they may not be suitable as
|
|
|
|
a building block for Free Haven~\cite{freehaven-berk} or other anonymous
|
|
|
|
publishing systems that aim to provide long-term security.
|
|
|
|
|
|
|
|
\emph{Hot-swap} hidden services, where more than one location can
|
|
|
|
provide the service and loss of any one location does not imply a
|
|
|
|
change in service, would help foil intersection and observation attacks
|
|
|
|
where an adversary monitors availability of a hidden service and also
|
2005-02-07 23:22:54 +01:00
|
|
|
monitors whether certain users or servers are online. The design
|
2005-02-08 11:27:47 +01:00
|
|
|
challenges in providing such services without otherwise compromising
|
2005-02-07 23:22:54 +01:00
|
|
|
the hidden service's anonymity remain an open problem;
|
|
|
|
however, see~\cite{move-ndss05}.
|
2005-02-03 21:07:38 +01:00
|
|
|
|
|
|
|
In practice, hidden services are used for more than just providing private
|
|
|
|
access to a web server or IRC server. People are using hidden services
|
|
|
|
as a poor man's VPN and firewall-buster. Many people want to be able
|
|
|
|
to connect to the computers in their private network via secure shell,
|
|
|
|
and rather than playing with dyndns and trying to pierce holes in their
|
|
|
|
firewall, they run a hidden service on the inside and then rendezvous
|
|
|
|
with that hidden service externally.
|
|
|
|
|
2005-02-08 11:27:47 +01:00
|
|
|
News sites like Bloggers Without Borders (www.b19s.org) are advertising
|
2005-02-03 21:07:38 +01:00
|
|
|
a hidden-service address on their front page. Doing this can provide
|
2005-02-07 23:22:54 +01:00
|
|
|
increased robustness if they use the dual-IP approach we describe
|
|
|
|
in~\cite{tor-design},
|
|
|
|
but in practice they do it firstly to increase visibility
|
|
|
|
of the Tor project and their support for privacy, and secondly to offer
|
2005-02-03 21:07:38 +01:00
|
|
|
a way for their users, using unmodified software, to get end-to-end
|
|
|
|
encryption and end-to-end authentication to their website.
|
2005-01-30 02:13:29 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
\subsection{Location diversity and ISP-class adversaries}
|
|
|
|
\label{subsec:routing-zones}
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
Anonymity networks have long relied on diversity of node location for
|
|
|
|
protection against attacks---typically an adversary who can observe a
|
|
|
|
larger fraction of the network can launch a more effective attack. One
|
|
|
|
way to achieve dispersal involves growing the network so a given adversary
|
|
|
|
sees less. Alternately, we can arrange the topology so traffic can enter
|
|
|
|
or exit at many places (for example, by using a free-route network
|
|
|
|
like Tor rather than a cascade network like JAP). Lastly, we can use
|
|
|
|
distributed trust to spread each transaction over multiple jurisdictions.
|
|
|
|
But how do we decide whether two nodes are in related locations?
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
Feamster and Dingledine defined a \emph{location diversity} metric
|
2005-02-08 21:34:57 +01:00
|
|
|
in~\cite{feamster:wpes2004}, and began investigating a variant of location
|
2005-02-08 08:54:28 +01:00
|
|
|
diversity based on the fact that the Internet is divided into thousands of
|
|
|
|
independently operated networks called {\em autonomous systems} (ASes).
|
|
|
|
The key insight from their paper is that while we typically think of a
|
2005-02-08 21:34:57 +01:00
|
|
|
connection as going directly from the Tor client to the first Tor node,
|
2005-02-08 08:54:28 +01:00
|
|
|
actually it traverses many different ASes on each hop. An adversary at
|
|
|
|
any of these ASes can monitor or influence traffic. Specifically, given
|
2005-02-08 21:34:57 +01:00
|
|
|
plausible initiators and recipients, and given random path selection,
|
2005-02-08 08:54:28 +01:00
|
|
|
some ASes in the simulation were able to observe 10\% to 30\% of the
|
|
|
|
transactions (that is, learn both the origin and the destination) on
|
|
|
|
the deployed Tor network (33 nodes as of June 2004).
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
The paper concludes that for best protection against the AS-level
|
|
|
|
adversary, nodes should be in ASes that have the most links to other ASes:
|
|
|
|
Tier-1 ISPs such as AT\&T and Abovenet. Further, a given transaction
|
2005-02-08 21:34:57 +01:00
|
|
|
is safest when it starts or ends in a Tier-1 ISP\@. Therefore, assuming
|
2005-02-08 08:54:28 +01:00
|
|
|
initiator and responder are both in the U.S., it actually \emph{hurts}
|
2005-02-08 21:34:57 +01:00
|
|
|
our location diversity to enter or exit from far-flung nodes in
|
|
|
|
continents like Asia or South America.
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
Many open questions remain. First, it will be an immense engineering
|
|
|
|
challenge to get an entire BGP routing table to each Tor client, or to
|
|
|
|
summarize it sufficiently. Without a local copy, clients won't be
|
|
|
|
able to safely predict what ASes will be traversed on the various paths
|
|
|
|
through the Tor network to the final destination. Tarzan~\cite{tarzan:ccs02}
|
|
|
|
and MorphMix~\cite{morphmix:fc04} suggest that we compare IP prefixes to
|
|
|
|
determine location diversity; but the above paper showed that in practice
|
|
|
|
many of the Mixmaster nodes that share a single AS have entirely different
|
|
|
|
IP prefixes. When the network has scaled to thousands of nodes, does IP
|
|
|
|
prefix comparison become a more useful approximation?
|
|
|
|
%
|
|
|
|
Second, we can take advantage of caching certain content at the
|
|
|
|
exit nodes, to limit the number of requests that need to leave the
|
|
|
|
network at all. What about taking advantage of caches like Akamai or
|
|
|
|
Google~\cite{shsm03}? (Note that they're also well-positioned as global
|
|
|
|
adversaries.)
|
|
|
|
%
|
2005-02-08 21:34:57 +01:00
|
|
|
Third, if we follow the recommendations in~\cite{feamster:wpes2004}
|
|
|
|
and tailor path selection
|
2005-02-08 08:54:28 +01:00
|
|
|
to avoid choosing endpoints in similar locations, how much are we hurting
|
|
|
|
anonymity against larger real-world adversaries who can take advantage
|
|
|
|
of knowing our algorithm?
|
|
|
|
%
|
|
|
|
Lastly, can we use this knowledge to figure out which gaps in our network
|
|
|
|
would most improve our robustness to this class of attack, and go recruit
|
|
|
|
new nodes with those ASes in mind?
|
2005-02-07 23:22:54 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
%Tor's security relies in large part on the dispersal properties of its
|
|
|
|
%network. We need to be more aware of the anonymity properties of various
|
|
|
|
%approaches so we can make better design decisions in the future.
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
\subsection{The China problem}
|
|
|
|
\label{subsec:china}
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
Citizens in a variety of countries, such as most recently China and
|
|
|
|
Iran, are periodically blocked from accessing various sites outside
|
|
|
|
their country. These users try to find any tools available to allow
|
|
|
|
them to get-around these firewalls. Some anonymity networks, such as
|
|
|
|
Six-Four~\cite{six-four}, are designed specifically with this goal in
|
|
|
|
mind; others like the Anonymizer~\cite{anonymizer} are paid by sponsors
|
|
|
|
such as Voice of America to set up a network to encourage Internet
|
|
|
|
freedom. Even though Tor wasn't
|
|
|
|
designed with ubiquitous access to the network in mind, thousands of
|
|
|
|
users across the world are trying to use it for exactly this purpose.
|
|
|
|
% Academic and NGO organizations, peacefire, \cite{berkman}, etc
|
|
|
|
|
|
|
|
Anti-censorship networks hoping to bridge country-level blocks face
|
|
|
|
a variety of challenges. One of these is that they need to find enough
|
|
|
|
exit nodes---servers on the `free' side that are willing to relay
|
|
|
|
arbitrary traffic from users to their final destinations. Anonymizing
|
|
|
|
networks including Tor are well-suited to this task, since we have
|
|
|
|
already gathered a set of exit nodes that are willing to tolerate some
|
|
|
|
political heat.
|
|
|
|
|
|
|
|
The other main challenge is to distribute a list of reachable relays
|
|
|
|
to the users inside the country, and give them software to use them,
|
|
|
|
without letting the authorities also enumerate this list and block each
|
|
|
|
relay. Anonymizer solves this by buying lots of seemingly-unrelated IP
|
|
|
|
addresses (or having them donated), abandoning old addresses as they are
|
|
|
|
`used up', and telling a few users about the new ones. Distributed
|
|
|
|
anonymizing networks again have an advantage here, in that we already
|
|
|
|
have tens of thousands of separate IP addresses whose users might
|
|
|
|
volunteer to provide this service since they've already installed and use
|
|
|
|
the software for their own privacy~\cite{koepsell:wpes2004}. Because
|
|
|
|
the Tor protocol separates routing from network discovery \cite{tor-design},
|
|
|
|
volunteers could configure their Tor clients
|
|
|
|
to generate node descriptors and send them to a special directory
|
|
|
|
server that gives them out to dissidents who need to get around blocks.
|
|
|
|
|
|
|
|
Of course, this still doesn't prevent the adversary
|
|
|
|
from enumerating all the volunteer relays and blocking them preemptively.
|
|
|
|
Perhaps a tiered-trust system could be built where a few individuals are
|
|
|
|
given relays' locations, and they recommend other individuals by telling them
|
|
|
|
those addresses, thus providing a built-in incentive to avoid letting the
|
|
|
|
adversary intercept them. Max-flow trust algorithms~\cite{advogato}
|
|
|
|
might help to bound the number of IP addresses leaked to the adversary. Groups
|
|
|
|
like the W3C are looking into using Tor as a component in an overall system to
|
|
|
|
help address censorship; we wish them luck.
|
|
|
|
|
|
|
|
%\cite{infranet}
|
2005-01-27 02:16:52 +01:00
|
|
|
|
2005-02-07 04:39:34 +01:00
|
|
|
\section{Scaling}
|
2005-02-08 08:37:30 +01:00
|
|
|
\label{sec:scaling}
|
2005-01-07 04:22:18 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
Tor is running today with hundreds of nodes and tens of thousands of
|
2005-01-26 11:46:53 +01:00
|
|
|
users, but it will certainly not scale to millions.
|
2005-01-26 06:29:08 +01:00
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
Scaling Tor involves three main challenges. First is safe node
|
2005-01-26 06:29:08 +01:00
|
|
|
discovery, both bootstrapping -- how a Tor client can robustly find an
|
2005-02-07 23:22:54 +01:00
|
|
|
initial node list -- and ongoing -- how a Tor client can learn about
|
|
|
|
a fair sample of honest nodes and not let the adversary control his
|
2005-02-07 04:39:34 +01:00
|
|
|
circuits (see Section~\ref{subsec:trust-and-discovery}). Second is detecting and handling the speed
|
2005-02-07 23:22:54 +01:00
|
|
|
and reliability of the variety of nodes we must use if we want to
|
|
|
|
accept many nodes (see Section~\ref{subsec:performance}).
|
2005-01-26 06:29:08 +01:00
|
|
|
Since the speed and reliability of a circuit is limited by its worst link,
|
|
|
|
we must learn to track and predict performance. Finally, in order to get
|
2005-02-07 23:22:54 +01:00
|
|
|
a large set of nodes in the first place, we must address incentives
|
2005-02-08 21:34:57 +01:00
|
|
|
for users to carry traffic for others.
|
2005-01-26 01:39:03 +01:00
|
|
|
|
2005-01-30 02:13:29 +01:00
|
|
|
\subsection{Incentives by Design}
|
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
There are three behaviors we need to encourage for each Tor node: relaying
|
2005-01-26 06:29:08 +01:00
|
|
|
traffic; providing good throughput and reliability while doing it;
|
2005-02-07 23:22:54 +01:00
|
|
|
and allowing traffic to exit the network from that node.
|
2005-01-26 06:29:08 +01:00
|
|
|
|
|
|
|
We encourage these behaviors through \emph{indirect} incentives, that
|
|
|
|
is, designing the system and educating users in such a way that users
|
2005-02-07 04:39:34 +01:00
|
|
|
with certain goals will choose to relay traffic. One
|
2005-02-07 23:22:54 +01:00
|
|
|
main incentive for running a Tor node is social benefit: volunteers
|
2005-01-26 06:29:08 +01:00
|
|
|
altruistically donate their bandwidth and time. We also keep public
|
2005-02-07 23:22:54 +01:00
|
|
|
rankings of the throughput and reliability of nodes, much like
|
2005-02-07 04:39:34 +01:00
|
|
|
seti@home. We further explain to users that they can get plausible
|
|
|
|
deniability for any traffic emerging from the same address as a Tor
|
2005-02-07 23:22:54 +01:00
|
|
|
exit node, and they can use their own Tor node
|
2005-01-26 06:29:08 +01:00
|
|
|
as entry or exit point and be confident it's not run by the adversary.
|
2005-02-08 21:34:57 +01:00
|
|
|
Further, users may run a node simply because they need such a network
|
|
|
|
to be persistently available and usable.
|
|
|
|
And, the value of supporting this exceeds any countervening costs.
|
2005-01-26 06:29:08 +01:00
|
|
|
Finally, we can improve the usability and feature set of the software:
|
|
|
|
rate limiting support and easy packaging decrease the hassle of
|
2005-02-07 23:22:54 +01:00
|
|
|
maintaining a node, and our configurable exit policies allow each
|
2005-01-26 06:29:08 +01:00
|
|
|
operator to advertise a policy describing the hosts and ports to which
|
|
|
|
he feels comfortable connecting.
|
|
|
|
|
2005-02-07 04:39:34 +01:00
|
|
|
To date these appear to have been adequate. As the system scales or as
|
|
|
|
new issues emerge, however, we may also need to provide
|
|
|
|
\emph{direct} incentives:
|
2005-01-26 06:29:08 +01:00
|
|
|
providing payment or other resources in return for high-quality service.
|
|
|
|
Paying actual money is problematic: decentralized e-cash systems are
|
|
|
|
not yet practical, and a centralized collection system not only reduces
|
|
|
|
robustness, but also has failed in the past (the history of commercial
|
|
|
|
anonymizing networks is littered with failed attempts). A more promising
|
|
|
|
option is to use a tit-for-tat incentive scheme: provide better service
|
|
|
|
to nodes that have provided good service to you.
|
|
|
|
|
|
|
|
Unfortunately, such an approach introduces new anonymity problems.
|
2005-02-07 23:22:54 +01:00
|
|
|
There are many surprising ways for nodes to game the incentive and
|
2005-02-07 04:39:34 +01:00
|
|
|
reputation system to undermine anonymity because such systems are
|
|
|
|
designed to encourage fairness in storage or bandwidth usage not
|
|
|
|
fairness of provided anonymity. An adversary can attract more traffic
|
|
|
|
by performing well or can provide targeted differential performance to
|
|
|
|
individual users to undermine their anonymity. Typically a user who
|
|
|
|
chooses evenly from all options is most resistant to an adversary
|
2005-02-08 21:34:57 +01:00
|
|
|
targeting him, but that approach precludes the efficient use
|
|
|
|
of heterogeneous nodes.
|
2005-02-07 04:39:34 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
%When a node (call him Steve) performs well for Alice, does Steve gain
|
2005-02-07 04:39:34 +01:00
|
|
|
%reputation with the entire system, or just with Alice? If the entire
|
|
|
|
%system, how does Alice tell everybody about her experience in a way that
|
|
|
|
%prevents her from lying about it yet still protects her identity? If
|
|
|
|
%Steve's behavior only affects Alice's behavior, does this allow Steve to
|
|
|
|
%selectively perform only for Alice, and then break her anonymity later
|
|
|
|
%when somebody (presumably Alice) routes through his node?
|
|
|
|
|
|
|
|
A possible solution is a simplified approach to the tit-for-tat
|
2005-01-26 06:29:08 +01:00
|
|
|
incentive scheme based on two rules: (1) each node should measure the
|
2005-02-07 04:39:34 +01:00
|
|
|
service it receives from adjacent nodes, and provide service relative
|
|
|
|
to the received service, but (2) when a node is making decisions that
|
|
|
|
affect its own security (e.g. when building a circuit for its own
|
|
|
|
application connections), it should choose evenly from a sufficiently
|
|
|
|
large set of nodes that meet some minimum service threshold
|
|
|
|
\cite{casc-rep}. This approach allows us to discourage bad service
|
|
|
|
without opening Alice up as much to attacks. All of this requires
|
|
|
|
further study.
|
|
|
|
|
2005-01-26 06:29:08 +01:00
|
|
|
|
|
|
|
%XXX rewrite the above so it sounds less like a grant proposal and
|
|
|
|
%more like a "if somebody were to try to solve this, maybe this is a
|
|
|
|
%good first step".
|
|
|
|
|
|
|
|
%We should implement the above incentive scheme in the
|
|
|
|
%deployed Tor network, in conjunction with our plans to add the necessary
|
|
|
|
%associated scalability mechanisms. We will do experiments (simulated
|
|
|
|
%and/or real) to determine how much the incentive system improves
|
|
|
|
%efficiency over baseline, and also to determine how far we are from
|
|
|
|
%optimal efficiency (what we could get if we ignored the anonymity goals).
|
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
\subsection{Trust and discovery}
|
|
|
|
\label{subsec:trust-and-discovery}
|
2005-01-31 07:43:38 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
The published Tor design adopted a deliberately simplistic design for
|
|
|
|
authorizing new nodes and informing clients about Tor nodes and their status.
|
2005-02-08 21:34:57 +01:00
|
|
|
In preliminary Tor designs, all nodes periodically uploaded a
|
|
|
|
signed description
|
2005-02-08 08:54:28 +01:00
|
|
|
of their locations, keys, and capabilities to each of several well-known {\it
|
|
|
|
directory servers}. These directory servers constructed a signed summary
|
|
|
|
of all known Tor nodes (a ``directory''), and a signed statement of which
|
|
|
|
nodes they
|
|
|
|
believed to be operational at any given time (a ``network status''). Clients
|
|
|
|
periodically downloaded a directory in order to learn the latest nodes and
|
2005-02-08 21:34:57 +01:00
|
|
|
keys, and more frequently downloaded a network status to learn which nodes were
|
2005-02-08 08:54:28 +01:00
|
|
|
likely to be running. Tor nodes also operate as directory caches, in order to
|
|
|
|
lighten the bandwidth on the authoritative directory servers.
|
2005-01-31 07:43:38 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
In order to prevent Sybil attacks (wherein an adversary signs up many
|
|
|
|
purportedly independent nodes in order to increase her chances of observing
|
|
|
|
a stream as it enters and leaves the network), the early Tor directory design
|
|
|
|
required the operators of the authoritative directory servers to manually
|
|
|
|
approve new nodes. Unapproved nodes were included in the directory,
|
|
|
|
but clients
|
|
|
|
did not use them at the start or end of their circuits. In practice,
|
|
|
|
directory administrators performed little actual verification, and tended to
|
|
|
|
approve any Tor node whose operator could compose a coherent email.
|
|
|
|
This procedure
|
|
|
|
may have prevented trivial automated Sybil attacks, but would do little
|
2005-02-08 21:34:57 +01:00
|
|
|
against a clever and determined attacker.
|
2005-01-31 07:43:38 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
There are a number of flaws in this system that need to be addressed as we
|
|
|
|
move forward. They include:
|
|
|
|
\begin{tightlist}
|
|
|
|
\item Each directory server represents an independent point of failure; if
|
|
|
|
any one were compromised, it could immediately compromise all of its users
|
|
|
|
by recommending only compromised nodes.
|
|
|
|
\item The more nodes join the network, the more unreasonable it
|
|
|
|
becomes to expect clients to know about them all. Directories
|
|
|
|
become infeasibly large, and downloading the list of nodes becomes
|
|
|
|
burdensome.
|
|
|
|
\item The validation scheme may do as much harm as it does good. It is not
|
|
|
|
only incapable of preventing clever attackers from mounting Sybil attacks,
|
|
|
|
but may deter node operators from joining the network. (For instance, if
|
|
|
|
they expect the validation process to be difficult, or if they do not share
|
|
|
|
any languages in common with the directory server operators.)
|
|
|
|
\end{tightlist}
|
2005-01-31 07:43:38 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
We could try to move the system in several directions, depending on our
|
|
|
|
choice of threat model and requirements. If we did not need to increase
|
|
|
|
network capacity in order to support more users, we could simply
|
|
|
|
adopt even stricter validation requirements, and reduce the number of
|
|
|
|
nodes in the network to a trusted minimum.
|
|
|
|
But, we can only do that if can simultaneously make node capacity
|
2005-02-08 21:34:57 +01:00
|
|
|
scale much more than we anticipate to be feasible soon, and if we can find
|
2005-02-08 08:54:28 +01:00
|
|
|
entities willing to run such nodes, an equally daunting prospect.
|
2005-01-30 02:13:29 +01:00
|
|
|
|
2005-01-22 09:35:01 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
In order to address the first two issues, it seems wise to move to a system
|
|
|
|
including a number of semi-trusted directory servers, no one of which can
|
|
|
|
compromise a user on its own. Ultimately, of course, we cannot escape the
|
|
|
|
problem of a first introducer: since most users will run Tor in whatever
|
|
|
|
configuration the software ships with, the Tor distribution itself will
|
|
|
|
remain a potential single point of failure so long as it includes the seed
|
|
|
|
keys for directory servers, a list of directory servers, or any other means
|
|
|
|
to learn which nodes are on the network. But omitting this information
|
|
|
|
from the Tor distribution would only delegate the trust problem to the
|
|
|
|
individual users, most of whom are presumably less informed about how to make
|
|
|
|
trust decisions than the Tor developers.
|
2005-01-26 01:39:03 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
%Network discovery, sybil, node admission, scaling. It seems that the code
|
|
|
|
%will ship with something and that's our trust root. We could try to get
|
|
|
|
%people to build a web of trust, but no. Where we go from here depends
|
|
|
|
%on what threats we have in mind. Really decentralized if your threat is
|
|
|
|
%RIAA; less so if threat is to application data or individuals or...
|
2005-01-29 08:25:44 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
\subsection{Measuring performance and capacity}
|
|
|
|
\label{subsec:performance}
|
2005-01-29 08:25:44 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
One of the paradoxes with engineering an anonymity network is that we'd like
|
|
|
|
to learn as much as we can about how traffic flows so we can improve the
|
|
|
|
network, but we want to prevent others from learning how traffic flows in
|
|
|
|
order to trace users' connections through the network. Furthermore, many
|
|
|
|
mechanisms that help Tor run efficiently
|
|
|
|
require measurements about the network.
|
2005-01-29 08:25:44 +01:00
|
|
|
|
2005-02-08 08:54:28 +01:00
|
|
|
Currently, nodes try to deduce their own available bandwidth (based on how
|
|
|
|
much traffic they have been able to transfer recently) and include this
|
|
|
|
information in the descriptors they upload to the directory. Clients
|
|
|
|
choose servers weighted by their bandwidth, neglecting really slow
|
|
|
|
servers and capping the influence of really fast ones.
|
2005-02-08 11:46:55 +01:00
|
|
|
%
|
2005-02-08 08:54:28 +01:00
|
|
|
This is, of course, eminently cheatable. A malicious node can get a
|
|
|
|
disproportionate amount of traffic simply by claiming to have more bandwidth
|
|
|
|
than it does. But better mechanisms have their problems. If bandwidth data
|
|
|
|
is to be measured rather than self-reported, it is usually possible for
|
|
|
|
nodes to selectively provide better service for the measuring party, or
|
|
|
|
sabotage the measured value of other nodes. Complex solutions for
|
|
|
|
mix networks have been proposed, but do not address the issues
|
|
|
|
completely~\cite{mix-acc,casc-rep}.
|
|
|
|
|
|
|
|
Even with no cheating, network measurement is complex. It is common
|
|
|
|
for views of a node's latency and/or bandwidth to vary wildly between
|
|
|
|
observers. Further, it is unclear whether total bandwidth is really
|
|
|
|
the right measure; perhaps clients should instead be considering nodes
|
|
|
|
based on unused bandwidth or observed throughput.
|
|
|
|
% XXXX say more here?
|
|
|
|
|
|
|
|
%How to measure performance without letting people selectively deny service
|
|
|
|
%by distinguishing pings. Heck, just how to measure performance at all. In
|
|
|
|
%practice people have funny firewalls that don't match up to their exit
|
|
|
|
%policies and Tor doesn't deal.
|
|
|
|
|
|
|
|
%Network investigation: Is all this bandwidth publishing thing a good idea?
|
|
|
|
%How can we collect stats better? Note weasel's smokeping, at
|
|
|
|
%http://seppia.noreply.org/cgi-bin/smokeping.cgi?target=Tor
|
|
|
|
%which probably gives george and steven enough info to break tor?
|
|
|
|
|
|
|
|
Even if we can collect and use this network information effectively, we need
|
|
|
|
to make sure that it is not more useful to attackers than to us. While it
|
|
|
|
seems plausible that bandwidth data alone is not enough to reveal
|
|
|
|
sender-recipient connections under most circumstances, it could certainly
|
|
|
|
reveal the path taken by large traffic flows under low-usage circumstances.
|
2005-01-27 10:57:06 +01:00
|
|
|
|
2005-01-27 21:51:45 +01:00
|
|
|
\subsection{Non-clique topologies}
|
|
|
|
|
2005-02-08 21:34:57 +01:00
|
|
|
Tor's comparatively weak threat model makes it easier to scale than
|
|
|
|
other mix net
|
2005-02-03 20:06:09 +01:00
|
|
|
designs. High-latency mix networks need to avoid partitioning attacks, where
|
|
|
|
network splits prevent users of the separate partitions from providing cover
|
|
|
|
for each other. In Tor, however, we assume that the adversary cannot
|
|
|
|
cheaply observe nodes at will, so even if the network becomes split, the
|
|
|
|
users do not necessarily receive much less protection.
|
|
|
|
Thus, a simple possibility when the scale of a Tor network
|
2005-01-28 23:53:54 +01:00
|
|
|
exceeds some size is to simply split it. Care could be taken in
|
|
|
|
allocating which nodes go to which network along the lines of
|
|
|
|
\cite{casc-rep} to insure that collaborating hostile nodes are not
|
|
|
|
able to gain any advantage in network splitting that they do not
|
|
|
|
already have in joining a network.
|
|
|
|
|
2005-02-07 20:55:21 +01:00
|
|
|
If the network is split,
|
2005-01-28 23:53:54 +01:00
|
|
|
a client does not need to use just one of the two resulting networks.
|
|
|
|
Alice could use either of them, and it would not be difficult to make
|
|
|
|
the Tor client able to access several such network on a per circuit
|
|
|
|
basis. More analysis is needed; we simply note here that splitting
|
|
|
|
a Tor network is an easy way to achieve moderate scalability and that
|
|
|
|
it does not necessarily have the same implications as splitting a mixnet.
|
|
|
|
|
2005-02-03 20:06:09 +01:00
|
|
|
Alternatively, we can try to scale a single Tor network. Some issues for
|
|
|
|
scaling include restricting the number of sockets and the amount of bandwidth
|
2005-02-07 23:22:54 +01:00
|
|
|
used by each node. The number of sockets is determined by the network's
|
2005-02-03 20:06:09 +01:00
|
|
|
connectivity and the number of users, while bandwidth capacity is determined
|
2005-02-07 23:22:54 +01:00
|
|
|
by the total bandwidth of nodes on the network. The simplest solution to
|
2005-02-08 21:34:57 +01:00
|
|
|
bandwidth capacity is to add more nodes, since adding a Tor node of any
|
2005-02-03 20:06:09 +01:00
|
|
|
feasible bandwidth will increase the traffic capacity of the network. So as
|
|
|
|
a first step to scaling, we should focus on making the network tolerate more
|
2005-02-07 23:22:54 +01:00
|
|
|
nodes, by reducing the interconnectivity of the nodes; later we can reduce
|
2005-02-07 20:55:21 +01:00
|
|
|
overhead associated with directories, discovery, and so on.
|
2005-02-03 20:06:09 +01:00
|
|
|
|
|
|
|
By reducing the connectivity of the network we increase the total number of
|
2005-02-03 22:28:03 +01:00
|
|
|
nodes that the network can contain. Danezis~\cite{danezis-pets03} considers
|
2005-02-03 20:06:09 +01:00
|
|
|
the anonymity implications of restricting routes on mix networks, and
|
|
|
|
recommends an approach based on expander graphs (where any subgraph is likely
|
|
|
|
to have many neighbors). It is not immediately clear that this approach will
|
|
|
|
extend to Tor, which has a weaker threat model but higher performance
|
|
|
|
requirements than the network considered. Instead of analyzing the
|
|
|
|
probability of an attacker's viewing whole paths, we will need to examine the
|
|
|
|
attacker's likelihood of compromising the endpoints of a Tor circuit through
|
|
|
|
a sparse network.
|
|
|
|
|
|
|
|
% Nick edits these next 2 grafs.
|
|
|
|
|
|
|
|
To make matters simpler, Tor may not need an expander graph per se: it
|
2005-01-28 23:53:54 +01:00
|
|
|
may be enough to have a single subnet that is highly connected. As an
|
|
|
|
example, assume fifty nodes of relatively high traffic capacity. This
|
2005-02-08 21:34:57 +01:00
|
|
|
\emph{center} forms a clique. Assume each center node can
|
2005-01-28 23:53:54 +01:00
|
|
|
handle 200 connections to other nodes (including the other ones in the
|
|
|
|
center). Assume every noncenter node connects to three nodes in the
|
|
|
|
center and anyone out of the center that they want to. Then the
|
|
|
|
network easily scales to c. 2500 nodes with commensurate increase in
|
|
|
|
bandwidth. There are many open questions: how directory information
|
|
|
|
is distributed (presumably information about the center nodes could
|
|
|
|
be given to any new nodes with their codebase), whether center nodes
|
|
|
|
will need to function as a `backbone', etc. As above the point is
|
|
|
|
that this would create problems for the expected anonymity for a mixnet,
|
2005-02-08 21:34:57 +01:00
|
|
|
but for a low-latency network where anonymity derives largely from
|
2005-01-28 23:53:54 +01:00
|
|
|
the edges, it may be feasible.
|
|
|
|
|
|
|
|
Another point is that we already have a non-clique topology.
|
|
|
|
Individuals can set up and run Tor nodes without informing the
|
|
|
|
directory servers. This will allow, e.g., dissident groups to run a
|
|
|
|
local Tor network of such nodes that connects to the public Tor
|
2005-02-08 21:34:57 +01:00
|
|
|
network. This network is hidden behind the Tor network, and its
|
|
|
|
only visible connection to Tor is at those points where it connects.
|
|
|
|
As far as the public network, or anyone observing it, is concerned,
|
2005-01-28 23:53:54 +01:00
|
|
|
they are running clients.
|
|
|
|
|
2005-01-25 11:38:09 +01:00
|
|
|
\section{The Future}
|
|
|
|
\label{sec:conclusion}
|
2005-01-22 09:35:01 +01:00
|
|
|
|
2005-02-08 07:54:47 +01:00
|
|
|
Tor is the largest and most diverse low-latency anonymity network
|
|
|
|
available, but we are still in the beginning stages of deployment. Several
|
|
|
|
major questions remain.
|
|
|
|
|
|
|
|
First, will our volunteer-based approach to sustainability work in the
|
|
|
|
long term? As we add more features and destabilize the network, the
|
|
|
|
developers spend a lot of time keeping the server operators happy. Even
|
|
|
|
though Tor is free software, the network would likely stagnate and die at
|
|
|
|
this stage if the developers stopped actively working on it. We may get
|
|
|
|
an unexpected boon from the fact that we're a general-purpose overlay
|
|
|
|
network: as Tor grows more popular, other groups who need an overlay
|
|
|
|
network on the Internet are starting to adapt Tor to their needs.
|
2005-02-08 08:37:30 +01:00
|
|
|
%
|
2005-02-08 07:54:47 +01:00
|
|
|
Second, Tor is only one of many components that preserve privacy online.
|
2005-02-08 21:34:57 +01:00
|
|
|
To keep identifying information out of application traffic, someone must build
|
2005-02-08 07:54:47 +01:00
|
|
|
more and better protocol-aware proxies that are usable by ordinary people.
|
2005-02-08 08:37:30 +01:00
|
|
|
%
|
2005-02-08 07:54:47 +01:00
|
|
|
Third, we need to gain a reputation for social good, and learn how to
|
|
|
|
coexist with the variety of Internet services and their established
|
|
|
|
authentication mechanisms. We can't just keep escalating the blacklist
|
|
|
|
standoff forever.
|
2005-02-08 08:37:30 +01:00
|
|
|
%
|
2005-02-08 08:54:28 +01:00
|
|
|
Fourth, the current Tor
|
2005-02-08 07:54:47 +01:00
|
|
|
architecture does not scale even to handle current user demand. We must
|
2005-02-08 11:27:47 +01:00
|
|
|
find designs and incentives to let some clients relay traffic too, without
|
2005-02-08 07:54:47 +01:00
|
|
|
sacrificing too much anonymity.
|
|
|
|
|
|
|
|
These are difficult and open questions, yet choosing not to solve them
|
2005-01-30 02:13:29 +01:00
|
|
|
means leaving most users to a less secure network or no anonymizing
|
2005-02-08 07:54:47 +01:00
|
|
|
network at all.
|
2005-01-22 09:35:01 +01:00
|
|
|
|
|
|
|
\bibliographystyle{plain} \bibliography{tor-design}
|
|
|
|
|
2005-02-01 12:39:54 +01:00
|
|
|
\clearpage
|
2005-01-29 08:25:44 +01:00
|
|
|
\appendix
|
|
|
|
|
|
|
|
\begin{figure}[t]
|
|
|
|
%\unitlength=1in
|
|
|
|
\centering
|
|
|
|
%\begin{picture}(6.0,2.0)
|
|
|
|
%\put(3,1){\makebox(0,0)[c]{\epsfig{figure=graphnodes,width=6in}}}
|
|
|
|
%\end{picture}
|
|
|
|
\mbox{\epsfig{figure=graphnodes,width=5in}}
|
2005-02-08 07:54:47 +01:00
|
|
|
\caption{Number of Tor nodes over time, through January 2005. Lowest
|
|
|
|
line is number of exit
|
2005-01-30 02:13:29 +01:00
|
|
|
nodes that allow connections to port 80. Middle line is total number of
|
2005-02-07 23:22:54 +01:00
|
|
|
verified (registered) Tor nodes. The line above that represents nodes
|
2005-02-08 07:54:47 +01:00
|
|
|
that are running but not yet registered.}
|
2005-01-29 08:25:44 +01:00
|
|
|
\label{fig:graphnodes}
|
|
|
|
\end{figure}
|
|
|
|
|
|
|
|
\begin{figure}[t]
|
|
|
|
\centering
|
|
|
|
\mbox{\epsfig{figure=graphtraffic,width=5in}}
|
2005-02-08 07:54:47 +01:00
|
|
|
\caption{The sum of traffic reported by each node over time, through
|
|
|
|
January 2005. The bottom
|
2005-01-30 02:13:29 +01:00
|
|
|
pair show average throughput, and the top pair represent the largest 15
|
|
|
|
minute burst in each 4 hour period.}
|
2005-01-29 08:25:44 +01:00
|
|
|
\label{fig:graphtraffic}
|
|
|
|
\end{figure}
|
|
|
|
|
2005-02-08 07:54:47 +01:00
|
|
|
\end{document}
|
2005-02-07 20:55:21 +01:00
|
|
|
|
2005-02-08 02:57:19 +01:00
|
|
|
Making use of nodes with little bandwidth, or high latency/packet loss.
|
2005-02-07 20:55:21 +01:00
|
|
|
|
2005-02-07 23:22:54 +01:00
|
|
|
Running Tor nodes behind NATs, behind great-firewalls-of-China, etc.
|
2005-02-07 20:55:21 +01:00
|
|
|
Restricted routes. How to propagate to everybody the topology? BGP
|
|
|
|
style doesn't work because we don't want just *one* path. Point to
|
|
|
|
Geoff's stuff.
|
|
|
|
|