[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] End-to-end correlation for fun and profit



On Wed, Aug 22, 2012 at 2:11 AM, Roger Dingledine <arma@xxxxxxx> wrote:
> I think your numbers may not be right (there are a lot of other subtleties
> to the calculation), but your point is still generally correct.

There are some subtleties, mainly the restriction on distinct families
in a circuit — you can account for them in a spreadsheet, or by
writing a proper analysis program, but I doubt that it will result in
more than a few percents difference (just speculating, maybe it's
more). Doing some heuristic search for intercepted nodes selection (a
few high-bandwidth Exit-only or Guard-only nodes) will probably push
the estimates in the other direction.

> For more details calculating diversity, see
> https://blog.torproject.org/blog/research-problem-measuring-safety-tor-network

This quote: “They only use relays with the Guard flag for their first
hop. They read weighting parameters from the consensus and use them to
avoid Guard-flagged nodes for positions other than the first hop and
avoid Exit-flagged nodes for positions other than the last hop, in
proportion to how much capacity is available in each category.” — is
this actually true? Are Guard+Exit nodes never used as guard nodes? Or
even only used as middle nodes (depending on how one reads the first
sentence)? I didn't see something like that in the code.

> Really? Across jurisdictions? And for 'all traffic of those relays'?
> I don't want to downplay the risk too far, but I think you overestimate
> "unsophisticated law enforcement operations".

Ok, maybe I overestimate LE — different countries have different
standards. Let's consider extra-legal attacks. You mentioned [1],
which looks at intercepting IX traffic. IX links are probably
considered a part of vital national infrastructure wherever they are
located (similarly to telcoms), so it would be extremely hard for a
non-LE adversary to install their (extremely expensive) equipment or
software in the relevant facilities. However, consider what would be
needed to intercept all traffic from the /28 networks mentioned here,
managed by ~20 VPS hosting providers (I don't think I noticed anything
residential, but intercepting that would be much easier). Let's say
you have a million dollars to spare. Allocate $50k for each of the
hosters, and budget another $50k for some smooth salesperson type who
will fly to each hosting facility / office, befriend an infrastructure
admin with beer / hookers / coke, and offer him $50k for shadowing
traffic from VPSes of interest to your own VPS (which might be
possible to do purely in software in most cases, probably). I think
it's doable, whether you are just curious and want your own
international surveillance operation, or treat it as a data mining
investment (there is probably a lot of interesting traffic going
through Tor, if you know what to look for). It is also quite cheap for
the effect.

[1] http://freehaven.net/anonbib/#murdoch-pet2007

> Well, do you have an alternative design that scales adequately to 6 or
> 7 figures of users, provides roughly-real-time browsing and other TCP
> connections, works on the Internet that we have, and has better traffic
> confirmation resistance?

For one, everyone should contribute as a relay. This also has the
potential to improve the users community, and advance hidden service
resources as a result. “Internet that we have” is also problematic,
because Internet is too hierarchical. I think that EFF should promote
large-scale ISP-independent mesh networks, instead of caring so much
about the ability of some CIA-funded NGO activists to get on Facebook.

> Or said another way, how well do other usable low-latency anonymity
> systems hold up to ongoing wiretaps at 25 arbitrary network locations? I
> believe the answer is 'mostly less well than Tor'.

Other anonymity systems don't care much about accessing clearnet. I am
not even sure whether I2P, for instance, has any active outproxies at
the moment, and they do fine, since they provide what the users need —
community, ability to religiously tweak the console panel, integrated
file sharing, etc.

> It would be interesting to see your stats on as AS level rather than
> a /24 netblock level.

I don't think it would change the top-25 list much, since. for
instance, all /28 networks there belong to different /16 classes.
Maybe something like Amazon EC2 could creep in, but I doubt that. But
it's difficult to say definitely, e.g:

$ cut -d' ' -f1 nodes | sort -u | wc -l
1595 (IPs)
$ cut -d' ' -f1 nodes | cut -d. -f1-3 | sort -u | wc -l
1461 (/24 networks)
$ cut -d' ' -f1 nodes | cut -d. -f1-2 | sort -u | wc -l
984 (/16 networks)

> I think we still do a pretty good job explaining the risks and limitations
> of using a system like Tor, e.g. in each Tor talk.

I don't think it matters much. Technical people are skeptical to begin
with. Non-technical people are irrational (e.g., if to judge from
experience with activists described on liberationtech mailing list) —
they will keep everything in plaintext and use unencrypted connections
even when told explicitly that it's dangerous. From my experience,
warnings only work when you show people something that will cause a
cognitive dissonance. I.e.: “don't email exams” doesn't work, whereas
“here is the exam you wrote for tomorrow, and here is the student who
stole it from your mailbox” works well. It seems that Tor is not yet
at the point where one can show such examples, although someone with a
few million $ to spare or to invest might to just that (see above).

-- 
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk