[metrics-team] Report on protecting Tor from Sybil attacks
Philipp Winter
phw at nymity.ch
Sat Feb 27 21:07:30 UTC 2016
Thanks for your thoughts, nusenu.
On Sat, Feb 27, 2016 at 03:31:42PM +0000, nusenu wrote:
> > Sybils per se do not have to be malicious; a relay operator could
> > simply have forgotten to configure her relays as a relay family.
> > Such Sybils are no threat to the Tor network
>
> That implies to some extend that the MyFamily setting is useless as it
> makes no difference if set or not.
>
> I would argue that even non-actively malicious "undeclared families" are
> a risk to tor clients because opsec failures will likely affect all
> relays in that undeclared family. If the operator's client gets
> compromised the odds are high that all relays fall with it. Operators of
> non properly configured families are therefore a more valuable target
> for malicious entities than an operator with a proper MyFamily
> configuration.
Right, I will add a clarifying sentence.
> Another question that comes up is: How do you tell benign Sybils apart
> from non-benign Sybils?
That's not always possible. Most of the malicious ones we caught were
tampering with exit traffic or with the DHT.
> > Our modules ran [...] and discovered 251 malicious exit relays, shown
> > in Appendix A
>
> Appendix A and table 4 do not "show" any relay information (like
> fingerprints)
>
> I was also not able to find them at
> https://nymity.ch/sybilhunting/
> or in
> https://nymity.ch/sybilhunting/sybil-groups.tar.bz2
> (i.e. there is no 2014-08 folder/file)
Yes, we only provide an attack summary. I will rephrase that.
> > Table 2: The Sybil groups
>
> Cross-checking with some OrNetRadar [1] emails:
>
> Jan 2016 cloudvps family size: 61 vs 97
> http://article.gmane.org/gmane.network.onion-routing.ornetradar/854
> (if we ignore non-running relays, up=0, then the counts match)
The numbers in Table 2 are the total number of fingerprints we have
observed.
> Does sybilhunter take relays without valid flags into account?
> Onionoo does (and should continue to do so) - which could explain the
> difference.
Sybilhunter generally considers relays without the valid flag.
> What is your "observation window size" for churn based detection?
> In Figure 10 you mention 1h, 12h and 24h "smoothing window sizes".
The window size in the published data is one, so it can easily be
smoothed.
> cloudvps (125 relays, 2015-12-30) - not in list?
> http://article.gmane.org/gmane.network.onion-routing.ornetradar/816
There are many groups that we did not include in the table because we
are limited by space.
> > Figure 4
>
> Are there plans to add such graphs to metrics?
> https://trac.torproject.org/projects/tor/ticket/15594
>
> or is that part of
> https://lists.torproject.org/pipermail/metrics-team/2016-January/000060.html
Yes, I would like to add the churn rate and the uptime visualisation to
metrics. I currently don't have much time to work on this, so there's
no ETA. I didn't file this ticket.
> > Once all sequences are sorted, we color adjacent sequences in red if
> > their uptime sequence is identical.
>
> from Dec 2015:
> "Right, I don't use perfect matching, so we can account for some noise"
>
> https://lists.torproject.org/pipermail/tor-dev/2015-December/010042.html
We changed that. The phrasing in the paper is correct.
> > [...] by eight distributed directory authorities [...]
> > [...] the nine directory authorities vote [...]
> > The majority of directory authorities, i.e., five out of eight
>
> 8... 9...
> how about 10 ;)
> moria1, gabelmoo, dannenberg, tor26, urras, maatuska, dizum, Faravahar,
> Tonga, longclaw
That's indeed a mistake, thanks for pointing it out. The correct number
is nine. Tonga is a bridge authority, not a directory authority.
Cheers,
Philipp
More information about the metrics-team
mailing list