[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] How can we trust the guards?



> @Aeris
> 
> I do not see how Sybil attacks relate to my question. The adversary will
> simply set up new nodes, without messing with attacking identities of
> existing ones.

Sybil attack is not attacking identity, but just running bunch of relays.

> As to the rest of it, let us calculate. Assuming that the adversary wants to
> control 4000 nodes for 3 years, the 70d startup period is irrelevant and
> negligible.

But because they have guard flags, those 4000 nodes must be on the top 25% 
bandwidth nodes. So this assume we have around 16k nodes currently. Which is 
false.
And current average guard bandwidth is around 40Mbps, so your attacker have 
156Gbps capacity…
And because of Tor nodes selection, those 4000 nodes must be on the more /16 
network as possible.

> Assuming further that operating the relays will cost the
> adversary $20/month each, the total "investment" required would be
> 20x12x3x4000=less than $3million
> 
> That’s  $1million a year to control most of the Tor nodes., You call this
> "costly"? This amount is a joke, a trifle, petty cash for any US or Russian
> government agency. FIFTY times this amount is STILL petty cash, so in case
> you think $20/month is not enough to run a relay, make it $1000 a month.

Having $$$$ is not enough. You can’t just send $$$$ in hardware and expect to 
be guard. You need to prove your worth to the network to have guard flag.
And you also need intelligence, because your node must be VERY differents each 
others or only few of your guard will be used (same /16 network, same country, 
same operator => never 2 nodes on a circuit or guard set).

> So I repeat - how is this prevented?

Re-read my first post. Tor node selection for circuit, Tor node guard flag 
assignment.
And because currently most of guards are controlled by well known or smart 
enough people, we don’t have such attacker.

Controlling all guards is NOT a serious problem ’til you also 
control other nodes (middle or exit).
If you think such attacker exists, just don’t use Tor, this is EXACTLY the 
threat model Tor can’t avoid and expressed on the paper.

Regards,
-- 
Aeris
Individual crypto-terrorist group self-radicalized on the digital Internet
https://imirhil.fr/

Protect your privacy, encrypt your communications
GPG : EFB74277 ECE4E222
OTR : 5769616D 2D3DAC72
https://café-vie-privée.fr/

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays