[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Multiplexing TCP streams within a circuit similar to EWMA



On Thu, Oct 05, 2017 at 03:18:07PM +0300, Yasir Al-Agl wrote:
> I've been working for some time on Tor multiplexing and circuit scheduling
> from a security perspective. I stumbled across the great work of Tang and
> Goldberg and their implementation of EWMA (2010), and while their main
> purpose was performance enhancement, it produced a certain level of
> randomness to circuit scheduling.

Be sure to check out the KIST papers too!

https://www.freehaven.net/anonbib/#jansen14-kist
https://arxiv.org/abs/1709.01044

>  I also experimented this and concluded that Tor will push the
> GET requests to the circuit queue (encapsulated in Tor cells) as they are
> received from the browser. This indicates that the order of which streams
> appear in a circuit queue, is primary controlled by the used browser.

Makes sense.

In fact, check out the hack that Mike Perry introduced to Tor Browser
to randomize the order of fetching things, with the goal of screwing up
website fingerprinting.

https://blog.torproject.org/experimental-defense-website-traffic-fingerprinting
https://trac.torproject.org/projects/tor/ticket/3914

I think Tor Browser still includes this feature. But I also think most
of the WF researchers have concluded that, at least as currently built,
it doesn't do much.

> Any idea why the algorithm is failing when the number of resources
> increases beyond four?

There are a bunch of tickets on stream level fairness, some closed
and some still open.

https://bugs.torproject.org/1298
https://bugs.torproject.org/1937
https://bugs.torproject.org/2179
https://bugs.torproject.org/2180

Hopefully these are all useful directions to explore,
--Roger

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk