Author Topic: Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization  (Read 298 times)

SeemsLegit

  • Newbie
  • *
  • Posts: 29
  • Karma: +7/-0
    • View Profile
    • Personal Message (Offline)
This report by Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann seems pretty scary. Especially section VI, C

"This means that within 8 months, the probability to deanonymize a long-running hidden service by one of these servers becoming its guard node is more than 90%, for a cost of EUR 8280 (approximately USD 11,000)"

Those holes haven't been patched yet, have they?
Amateurs practice until they get it right; professionals practice until they can’t get it wrong

SeemsLegit

  • Newbie
  • *
  • Posts: 29
  • Karma: +7/-0
    • View Profile
    • Personal Message (Offline)
EUR 82800 is still peanuts, to close SR.
Amateurs practice until they get it right; professionals practice until they can’t get it wrong

SeemsLegit

  • Newbie
  • *
  • Posts: 29
  • Karma: +7/-0
    • View Profile
    • Personal Message (Offline)
No low latency anonymity network is robust against collaborating intelligence agencies that achieve near global passive adversary status. They don't need to position themselves as entry nodes. They can tap IXPs and AS gateways for much cheaper and watch the connections between Tor clients and all entry nodes.
Well then they potentially need to tap Azerbadjan internet or wherever SR servers are, right? As it stands currently, some random nobody could do it as a fun hobby project. (Assuming I've understood everything correctly)
Amateurs practice until they get it right; professionals practice until they can’t get it wrong

Dread Pirate Roberts

  • Captain
  • Administrator
  • *****
  • Posts: 566
  • Karma: +552/-41
    • View Profile
    • Personal Message (Offline)
We have read this paper along with the many others currently out and have taken many measures to defend again it and in fact if you see my post on "Needle in the Haystack" there are solutions to fight against it further to as a community.
Quote 23: Criticism has plucked the imaginary flower from the chain not so that man may continue to bear the chain without consolation or fantasy but so that he may throw off the chain and cull the living flower.

kr-rypt

  • Hero Member
  • *****
  • Posts: 1463
  • Karma: +186/-51
  • why so serious?
    • View Profile
    • Personal Message (Offline)
We have read this paper along with the many others currently out and have taken many measures to defend again it and in fact if you see my post on "Needle in the Haystack" there are solutions to fight against it further to as a community.
A true leader :)
Ẅ͔͍̣̩́̾ͨͬ͞H̶̜̳̼̪͍̟̽ͯ̂ͯͬͨ̋̅Ơ̴̯̰̓̒͛̋ͪͮͅ ̷̯̣̘͚͙͇̟̲ͣ̋̃͌͝L͓͚͚͂̊ͮI̪̝͈̞͈͇͕̳͆ͥͧ̉͛V̵͖͓̦͕̝̭̘̯̻̆͟Ẻ̳̝͓͙̜̖̓̊̊̇̑̏́͜S̝̣̺̪͕̙̿ͫ̌͛͗͑ͨ́͞ ̋́҉͇̟̪Ī̷̷͕̥̠̙̭̰̥̜̌̐͆̽ͩ̕N̵̨̠ͦ͑ͦͩ͑ͯ̾̾͢ ̴̨͓̈̾ͣͨͬͪ͠A̷̶̲̱͇̘̘̫͂͐͆ͤ͢ ̒̔ͩͫ̔̆̋ͭ҉̴͚̫P̸̧̝̠̝̓͂̽ͯI̷̝͔̤̋͠N͚̗̐͋̾ͣ̂ͅE̱̰͍̝͂̈́̾̽ͨͧA̮̠̥͎̯̩̩̙ͥ̿̄ͣ̐̃͟ͅP̶̯͙̹͙͚̩̽ͨͪ̄ͣ͗͑̄͘͜P̯̜͈̯ͦͬ͊ͭͩ̌̐̍L̶̛͙̬͚̗̼ͣ̀ͣEͩͯ͂ͪ͑͘͡͝

crackerbarrel

  • Newbie
  • *
  • Posts: 32
  • Karma: +1/-7
    • View Profile
    • Personal Message (Offline)
Well then they potentially need to tap Azerbadjan internet or wherever SR servers are, right?

Depends on where the entry nodes are. If they are in UK or US, then it doesn't matter where your hidden service is located, they will tap the circuit. Diversifying the network helps. If all paths from your hidden service to the entry nodes are outside of their reach, then they can perform this attack. Reducing entry nodes to 1 increases the cost by another factor of 3. Making a trusted entry node permanent stops the attack completely if the adversary can't compel anyone upstream to cooperate.

What he said.
Loose lips sink ships.

jacob1234

  • Jr. Member
  • **
  • Posts: 89
  • Karma: +31/-1
  • Atomic Physicist
    • View Profile
    • Personal Message (Offline)
I'm sure the Tor developers are very well aware of anything in that paper and are working on making the software even more secure than the current version.

As for diversifying the network... it's a must. If you can spare the bandwidth or have the money to rent a VPS then do it and help the network out.

kok

  • Jr. Member
  • **
  • Posts: 98
  • Karma: +12/-16
    • View Profile
    • Personal Message (Offline)
Well then they potentially need to tap Azerbadjan internet or wherever SR servers are, right?

Depends on where the entry nodes are. If they are in UK or US, then it doesn't matter where your hidden service is located, they will tap the circuit. Diversifying the network helps. If all paths from your hidden service to the entry nodes are outside of their reach, then they can perform this attack. Reducing entry nodes to 1 increases the cost by another factor of 3. Making a trusted entry node permanent stops the attack completely if the adversary can't compel anyone upstream to cooperate.

What he said.

It only makes tracing a hidden service a little harder though, because the attacker can still find your entry guard. Tor Hidden services can all be traced by LE it isn't a matter of if they can it is a matter of how long will it take. It isn't even going to take more than a few months if they really try hard. Tor hidden services are not very anonymous. Neither are I2P hidden services. Low latency hidden services are all weakly anonymous.