[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] On picking Introduction Points in Next Generation Hidden Services



One missing piece of rend-spec-ng.txt [0] is a section on how HSes
should pick their Introduction Points (IPs). There are three main
questions here:
- How many IPs should an HS have?
- Which relays can be IPs?
- What's the lifetime of an IP?

==Introduction Points attacks==

  Before exploring these questions it's a good idea to state a rough
  threat model for IPs. First, let's get a visual taste, here is how
  IPs work in the current HS protocol:
  https://people.torproject.org/~asn/hs/ip_placement_currently.jpg
  (number of IPs reduced to 2 to make it more readable)
  
  As you can see, IPs are in a good position to conduct any of the
  following attacks:
  
  a) IPs can count the number of introductions for a subset of clients
     (i.e. in the figure above, IP_1 would be able to count
     introductions from the clients above it). Since clients pick IPs
     uniformly at random, it's not hard to extrapolate from that to the
     total number of introductions.
  
  b) IPs have presense information about the HS. That is, they know
     whether the HS is up or down at a given time since they have a
     long-term stable circuit to it.
  
     FWIW, regular clients also have this ability by continuously
     "pinging" the HS and noticing when it's down.
  
  And, of course, an attacker who controls all the IPs of an HS can
  trivially DoS the HS (till the HS refreshes its IPs).
  
  Furthermore, as part of the Next Generation HSes initiative [0], we
  are considering enhancing the availability of HSes by allowing
  multiple nodes per Hidden Service. A plausible idea for achieving that
  is to allow multiple IP circuits per Introduction Point, as explained
  in [tor-dev] by Christopher Baines [1]. This means that IPs would work
  like this:
  https://people.torproject.org/~asn/hs/ip_placement_scaling.jpg
  where HS_1, HS_2 and HS_3 are the various nodes of the HS.
  
  This allows the IPs to launch the following attacks:
  
  a) IPs can learn the number of nodes of an HS, by counting the number
     of IP circuits on them. Also, the IPs can learn the prsense of the
     nodes of an HS, by looking at the state of their circuit.
  
  b) IPs can choose which HS node will receive traffic.

==How many IPs should an HS have?==

  Now let's investigate how many IPs an HS should have.
  
  The current situation is that HSes attempt to estimate their own
  popularity [2], and then they launch a number of IPs between 3 and 10
  depending on how popular they think they are. FWIW, we don't really
  understand whether the formula works properly [3].
  
  There are a few options for the future here:
  
  a) Fix the formula and keep number of IPs dynamic based on the
     popularity of the HS.
  
     This is not a bad idea. However, we should make sure that from the
     number of IPs you can't easily derive the number of clients of the
     HS. Also we should make sure that the formula works properly.
  
  b) Have a static amount of IPs per HS. For example '5' of them.

     I'm not sure what kind of calculations we need to do to find the
     right constant here (same for the (a) option).
  
  c) Have a static amount of IPs per HS, but also allow this to be
     configurable by the HS operator.
  
     The idea here is that popular HSes can pump up the number of IPs
     to make the service more reachable. It's worth noting that HSes
     who do so will stand out as manually configured; not sure if any
     other partition attacks can happen here. Also, there is also the
     danger of all HS operators thinking they are special and pumping
     the number of IPs to 42.
  
  Generally, we want to have a healthy amount of IPs (so that they
  don't get DoSed, and that requests get load balanced nicely), but
  also not too many because every HS having many IP circuits will put
  a load to the network (especially with services like Torchat where
  each client is an HS), and also because we want to avoid too many
  nodes becoming our IPs over time (more on this below).

==Which relays can be IPs?==

  This seems to be the easiest question here and Tor is currently
  handling it well by only restricting IPs to be Stable nodes [4].
  
  This means that with the current network, we have about 4000 possible
  IPs to choose from [5].
  
  This makes sense since we want to maximize the set of possible IPs,
  but we also want them to be stable to decrease their natural churn.

==What's the lifetime of an IP?==

  Another hard question: How long should we keep IPs for?
  
  Currently, Tor keeps IPs for a random time between 18 to 24 hours [6].
  
  This seems like too short of a period if we actually want to protect
  against adversarial nodes ever becoming our IPs: Consider an HS with
  5 IPs that rotates them every 24 hours, in only two months it will
  use 300 nodes as IPs plus the natural churn (which is not negligible
  at all).
  
  With that in mind we need to look at all the possible attacks that
  IPs could launch and decide whether they should be short-lived or
  long-lived. For example, waldo in a related thread [7] [8] asks for
  short-lived IPs, but recent entry guard research has shown that making
  guards more long-lived is actually beneficial for security [9].
  
  I'm personally leaning towards more long-lived IPs but I still don't
  know what our constants should be. I could see anything from a week,
  to a month, to 5 months as reasonable IP lifetimes.
  
  We also need to look at INTRO_POINT_LIFETIME_INTRODUCTIONS, since
  apparently in the current code, IPs will expire on their own if they
  perform more than 16384 introductions.

==Conclusion==

  I hope that this thread serves as a good start on discussing
  Introduction Point security. After we take some decisions, we will
  need to write them down as a proposal and incorporate them in
  rend-spec-ng.txt.
  
  Also, this thread does not explore other IP matters, like how many HS
  nodes should correspond to each IP if we go ahead with the scaling
  ideas [10]. I decided to not include this in the discussion, so that we
  keep it simple and also so that we don't focus on a particular scaling
  scheme.

References:

[0]: https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt

[1]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006788.html

[2]: https://gitweb.torproject.org/tor.git/blob/ab3d5c049032651a9c9164262f9a8f81de9709d4:/src/or/rendservice.c#l1001

[3]: https://trac.torproject.org/projects/tor/ticket/8950

[4]: https://gitweb.torproject.org/tor.git/blob/bb68c731b897a967a4b7eb138728fa077617646e:/src/or/rendservice.c#l3173

[5]: https://metrics.torproject.org/network.html#relayflags

[6]: https://gitweb.torproject.org/tor.git/blob/bb68c731b897a967a4b7eb138728fa077617646e:/src/or/rendservice.c#l2998
     https://gitweb.torproject.org/tor.git/blob/bb68c731b897a967a4b7eb138728fa077617646e:/src/or/or.h#l4794

[7]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006815.html

[8]: waldo also mentions an IP guard discovery attack in another reply of his:
     https://lists.torproject.org/pipermail/tor-dev/2014-May/006843.html

     However, I'm not sure if it's actually doable, since I think that
     HSes will discard an IP that has failed a circuit. We need to
     look into this more seriously.
     
[9]: https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters

[10]:https://lists.torproject.org/pipermail/tor-dev/2013-October/005615.html
     https://lists.torproject.org/pipermail/tor-dev/2013-October/005683.html
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev