TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tor: The Second-Generation Onion Router (2004)

90 pointsby geekamalmost 12 years ago

4 comments

drostiealmost 12 years ago
In my usage of Tor it seemed like the router would choose a small subset of the network to be my set of entrance nodes[1] and the exit nodes chosen were also a small subset of the network[2]. Just clicking &quot;new identity&quot; on Vidalia would often fail to change one or the other, even though the middle node changed.<p>Combined with the 3-hop limit[3], this suggests that a network like Amunet or blutmagie, with a strong exit node presence, might be able to fully de-anonymize a tiny fraction of the traffic passing over Tor. This is interesting because Tor is trying to guard against mostly de-anonymizing arbitrary traffic, not fully de-anonymizing special traffic.<p>So if Amunet wants to de-anonymize a request, what does it do? The way this works is, Amunet runs a patched version of the Tor software; they buy a couple of servers in remote data centers which they do not notify the network as belonging to the Amunet. Those servers work as entrance nodes, not exit nodes. We&#x27;ll call this entrance node the Malicious Gateway.<p>Given a forwarded chunk of data, the malicious gateway can tell that it&#x27;s not forwarding that data to a known exit node, which means it&#x27;s the first of the three hops -- not the second. This means that the malicious gateway can pretty-reliably infer that the IP which contacted it was not a dumb router, but was the instigator of the packet -- even if that router was part of Tor.<p>Amunet sets up their service as follows: before the MG sends on the request to some out-of-control middle man M, it sends to the Amunet exit nodes a simple block saying &quot;expect a request of about this length routed from M; I am tracing it back to IP ____.&quot; If you accidentally chose to use an Amunet exit router, then the middle node&#x27;s distinctiveness has actually helped Amunet to filter the signal from the noise, so the proof gets <i>stronger</i> as the network grows (though the amount of compromised traffic diminishes). That boost is provided by the three-hops limit which also removes plausible deniability. And finally, since people choose a small block of entrance nodes, you can in principle get a <i>lot</i> of transaction data from just one person.<p>[1] This is intentional: you choose a small pool of entrance nodes because Tor wants to hide the fact that you&#x27;re using Tor from your ISP. Tor looks like HTTPS traffic to your ISP, but people don&#x27;t open lots of HTTPS traffic to lots of different sites in short periods of time. [2] There seem to be a few reasons for the limited exit node selection. First, it seems that Tor preferentially chooses high-bandwidth exit nodes. Second, exit nodes are not enabled-by-default, because people are scared about legal implications. [3] Three hops is hard-coded into the system. Changing to four hops would make the proposed attack reveal much, much less -- but it would also slow down the network by 33%. The issue has been raised before but the consensus appears to be that wanting four nodes makes you paranoid.
rsyncalmost 12 years ago
Tor is funded (as in today, currently) by the US Government.
评论 #5845524 未加载
评论 #5845500 未加载
评论 #5845280 未加载
majkealmost 12 years ago
PDF and TeX sources of this paper: <a href="https:&#x2F;&#x2F;svn.torproject.org&#x2F;svn&#x2F;projects&#x2F;design-paper&#x2F;tor-design.pdf" rel="nofollow">https:&#x2F;&#x2F;svn.torproject.org&#x2F;svn&#x2F;projects&#x2F;design-paper&#x2F;tor-des...</a>
ronreiteralmost 12 years ago
If you really want to stay anonymous, you&#x27;ll need to hack your own servers :)