[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] Timing of opening pre-emptive circuits?
- To: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-dev] Timing of opening pre-emptive circuits?
- From: s7r <s7r@xxxxxxxxxx>
- Date: Thu, 19 Sep 2019 02:32:43 +0300
- Autocrypt: addr=s7r@xxxxxxxxxx; prefer-encrypt=mutual; keydata= mQENBE9BogQBCADazBiEe0PGTgeUJ/JU4BDvdE2ZFD+MUOgf3+n78F6mXTxcLgyiE/3E4rA5 Sy3NzVRjqjzyn/MyDJDbsRpSKT6uVT5thYNyfDNBNqYmqdVS8Gu+H90z78x1WJ+DxVawk4IM mi8jmKcwlz7hOGROsR0+NyWjyghlzNHVgiJkWIvp5AVDg4F6o2oCH/vBbgomu3Ho5r7fiRZg I0uxsMLIkRI8bwB3SlVi3n4a94ZI2R9rXD9KNWzW4OT5LnICW1d/cuktwVBQRxGE6KFtVDzI chjuDWFaT9p6qROqoBRbsGF/mLg/sb26dwRxb7CnxfCWJn10ZGWo8jG6MM/QKEcxSj0JABEB AAG0NHM3ckBza3ktaXAub3JnIChBbm9ueW1pdHkgbWF0dGVycyEpIDxzN3JAc2t5LWlwLm9y Zz6JATgEEwECACIFAk9BogQCGwMGCwkIBwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEIN/pSyB JlsRbkQH/jfe6F9nbwwFBo2DuNJ+Ci2IpZEco1P6rWh2l3AzG0vOD82nYJ5uFIw+0v615tW8 WWNfeIsrbCRnmOAx8NGkGsk/j+SRJb41pQ79tyxdBg7txcbT9bAdcaImYoBBp+1bnyrAaROB 1wDq0jKX09ofKrrAUWOlddASpIBG5uKMLhHe1X14lmvgGHWDPHKrw4yzBN/nNfXYr+Ayjt9s NM6JETHIgqO6uvchiT20v2/SzD3FlysROkPeoFjGWUwAqH2r7RQyDLF6EoqkrcuwvjFXiOFE nFdNRbHQsKYXPhbk2JUiFQQcdLtJg6iaoRBnhATl4V6soP2EHYn3K1bz+eYL+AS5AQ0ET0Gi BAEIAMO7MGEfdMn72SQAK0m5rcEPj3mtSRRokMHl3YBNjFbj3O4QAwjpKBJ7RuPdF9B9IDAP a7mc+f33mpIgRnxKDwkjswPk74mMQRxe2wgv4AQ7yBICYYK99e6RYP0LC1PDIGXFPLjs0Teu QAxASFvNycC5JSfQUsAI3OTQjaGUaiUfavmJYkn9B6C2ktQgvM7qbxJvLP5X02tgp4G4gNiu 8ZA3aOUdX+8EQwERJZ8CuA/R6/2M2nEO3YRCsxaYSzob7nicjfoPvyvSYu3zXRFj+3uvDOK6 AGNILmftVUoRQ6/WsNaAQX42cDfSNYQ8uZ/zgTGatO3ArNb1uqWbMdbUA5sAEQEAAYkBHwQY AQIACQUCT0GiBAIbDAAKCRCDf6UsgSZbEZjSB/41TviTCxdiS4PLSDrQ3GOmQPpWZRk/O1tv 3y6T9p0XuC/oq6kKfToKuV2/Ok+589rtmrXhjzdk2otDKCRGejJFpVoU/vfR+jokArzpwyPa TWDAhMGmf5wmEAojsiOc9Zgj/CuS5nd/eLFi4QGtbLoDLrTrQSXB4qR0zJFoQfykVaERT2dm UV/D22opJc8jo3UBOBckgGi9jBi/2OvwEiFcZSl1u9Qi4+gbINOObQF5a0h9ReZCT1BUs5FV DSXBBYZTJJ2flnZH69Mb+9KxRMyqjhRzyGDUfY73SYlCpKX9buWMl0CCsDx+GrRVSxvQnA8b aSq1wlfKsJBimGtSAqf8
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Wed, 18 Sep 2019 19:33:10 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sky-ip.org; s=20110108; t=1568849573; bh=5+gRquxCiQQFYtWNqlaW5Jj9pVK+ySTkWRYVq+KjRMc=; h=Subject:To:References:From:Date:In-Reply-To; b=duxVnXF2ttVhifdNyjuIXr8vDlZJG96ZPPf3QOwDo09O3pOjBl1bBkMItUPv7rh3e X1MdI32k3ne3v/SkWisF4TYkXphaqVP5svPsF+gtLKVFJHYKnwQjt5prHUOtZrt8Ix sW+R3kfPHd6AZ+fMk44tIzKTV7AgOMwnlEvL3Cdg=
- In-reply-to: <b6fa9759-6163-1bd0-ae16-f75da4ed2968@airmail.cc>
- List-archive: <http://lists.torproject.org/pipermail/tor-dev/>
- List-help: <mailto:tor-dev-request@lists.torproject.org?subject=help>
- List-id: discussion regarding Tor development <tor-dev.lists.torproject.org>
- List-post: <mailto:tor-dev@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- References: <b6fa9759-6163-1bd0-ae16-f75da4ed2968@airmail.cc>
- Reply-to: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-dev" <tor-dev-bounces@xxxxxxxxxxxxxxxxxxxx>
- User-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
> Hi Tor-Dev,
>
> I'm curious what the timing is of Tor's opening of preemptive circuits.
> Specifically, consider the following attack:
>
> 1. A new stream is assigned to a clean circuit.
> 2. Because of the above, that clean circuit is now a dirty circuit.
> 3. Because of the above, the number of clean circuits is now decreased
> by 1.
> 4. Because of the above, the number of clean circuits is now lower than
> the number that Tor wants to have open.
> 5. Because of the above, Tor opens a new preemptive circuit.
> 6. An attacker who can observe the circuit in (1) and the circuit in (5)
> can deduce by temporal proximity that those 2 circuits belong to the
> same client.
>
> This attack seemed obvious enough to me that I assumed that Tor must
> have some kind of countermeasure to it, e.g. random delays in opening
> preemptive circuits. However, the tor-path specification doesn't
> mention any such countermeasure, and based on a brief search through the
> Tor source code, all I can find is that Tor opens preemptive circuits
> using a function that always gets called once per second (with no
> mention of any delay beyond that one-second interval, random or
> otherwise).
>
> So, does Tor make any effort to mitigate the above attack? If so, what
> mitigations are present, and where would I find them (in both the spec
> and the source code)? If not, is there any documented reason (e.g. "the
> attack is too hard to pull off" or "we want to mitigate it but haven't
> gotten to it yet") for the lack of mitigation?
>
> Cheers,
Hi Jeremy,
When I read your checklist from 1 to 6 I remembered that there was a
research made on this [1] (I think you are talking about the same thing,
except not mentioning where your "attacker" is positioned). If a counter
measure existed it would have been documented in the Tor spec for
tor-path of course, so I guess that part is correct.
There is an obvious straight forward solution to fix it [2], except
AFAIK nobody had time to work on this yet.
I guess this is because this threat is not very scary, it is nice to fix
it of course, but correlating anonymous circuits to the same anonymous
user is much less scary than:
- guard discovery attack;
- guard partitioning attacks / path-bias attacks;
- routers netflow recording of traffic patterns;
- v3 onion services;
There has been a lot of work into these directions.
[1]:
https://lists.torproject.org/pipermail/tor-dev/2014-September/007517.html
[2]:
https://lists.torproject.org/pipermail/tor-dev/2014-September/007518.html
If this thread model is interesting to you or your project(s), you can
take Paul's ideas from [2] and write a patch. It is also going to need a
proposal before it will be merged into Tor but at least there will be
some action ;)
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev