[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Suggestion: make _hidden services_ choose random entry nodes often!
All standard clients have the same entry nodes on a permanent basis or as
long as the entry nodes are up, while the middle and exit nodes changes
all the time. This is to reduce the chance of choosing an accidental path
that is end-to-end supervised when browsing the WWW.
With hidden services, this isn't needed, since these are end-to-end
encrypted connections. The same goes for those who visit hidden services.
And randomness is what hidden services need to stay safe.
Because it's generally easy to distinguish clients from servers from the
way data is transferred, and check if an IP is in the official Tor nodes
list or not, it should be pretty easy to find hidden service clients by
using a cluster of bad entry nodes to supervise IP addresses and traffic.
With a large enough cluster, like 100-200 bad entry nodes, all new hidden
services will have a 5-10% x3 chance to select a permanent bad entry
node. Old hidden services may already have chosen a bad one, or will have
the same 5-10% chance for each new entry node they select if their
regular nodes go down. It's just a matter of analyzing timings and
traffic, and the hidden service's IP could be found. This only regards
listed hidden services, but I guess most are.
Since hidden services don't need to stick to the same entry nodes, the
Tor developers should really consider making the Tor client randomly
choose entry nodes, just as with middle and exits, for hidden service
usage. It should be easy to add and it will increase the security of
hidden services greatly by adding lots of randomness.
_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk