[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-dev] Guard node security: ways forward (An update from the dev meeting)
A main theme in the recent Tor development meeting was guard node
security as discussed in Roger's blog post and in Tariq's et al. paper [0].
Over the course of the meeting we discussed various guard-related
subjects. Here are some of them:
a) Reducing the number of guards to 1 or 2 (#9273).
b) Increasing the guard rotation period (to 9 months or so) (#8240).
c) The fact that your set of guard nodes can act as a network
fingerprint even if you switch to different networks (#10969).
d) The fact that authorities assign flags based on knowledge they
acquired while they were up. They don't use historical data to
assign flags, which means that an authority thas has been up for 1
month, only knows 1 month worth of information about each relay
(#10968).
e) We discussed introducing a weight parameter that makes guards that
have been guards for a long time, be more likely to be used as
guards.
f) We discussed how guards and circuit isolation should work
together. Maybe each isolation profile should have a different set
of guards. But what if we have hundreds of isolation profiles (we
are the gateway of a network)?
g) Should we refuse to add new guards after a certain number of
circuits have been killed (maybe it's an attack). But won't that
drive our users to simply reinstall Tor because they think it's
broken?
h) We discussed chaining consensus documents together as in a block
chain. This could help against targetted attacks where a set of bad
authorities give a poisoned consensus to a user. This design has
many problems though (how much data do we have to keep forever each
consensus? what happens in periods where no consensuses were
published?)
i) If we restrict the number of guards to 1, what happens to the
unlucky users that pick a slow guard? What's the probability of
being an unlucky user? Should we bump up the bandwidth threshold
for being a guard node? How does that change the diversity of our
guard selection process?
j) How do the above influence the security of Hidden Services? Guard
security is essential for the well-being of Hidden Services, but
how does increasing the guard rotation period combine with guard
enumeration attacks (#9001)?
We discussed more topics too. You can find Nick's raw notes at:
https://trac.torproject.org/projects/tor/wiki/org/meetings/2014WinterDevMeeting/notes/GuardDesign
To move forward, we decided that proposals should be written for (a)
and (b). We also decided that we should first evaluate whether doing
(a) and (b) are good ideas at all, especially with regards to (i).
[0]: https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
http://freehaven.net/anonbib/#wpes12-cogs
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev