[tor-bugs] #33815 [Core Tor/Tor]: vanguards with meek - do or don't?

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Apr 7 20:32:41 UTC 2020


#33815: vanguards with meek - do or don't?
--------------------------+----------------------------------
 Reporter:  cypherpunks   |          Owner:  (none)
     Type:  task          |         Status:  closed
 Priority:  Medium        |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:  duplicate
 Keywords:  vanguards     |  Actual Points:
Parent ID:                |         Points:
 Reviewer:                |        Sponsor:
--------------------------+----------------------------------

Comment (by mikeperry):

 Q4) Btw, here's my best guess of the kind of defense that *would* work in
 the general case. At a minimum, services will need to have a traffic re-
 shaper that makes their traffic patterns look like the reverse of what
 they are - HTTP is an aymmetric protocol in that requests are typically
 much smaller than responses. So some kind of traffic shaping to reverse
 this asymmetry is necessary (see ALPaCA for an example:
 https://www.freehaven.net/anonbib/cache/applicationlayer-pets2017.pdf).
 Then some amount of cover traffic would need to be carefully added onto
 this shaped application layer traffic, too. And even then, high volume
 onion services will at best look like high volume web
 crawlers/scrapers/bots, not real users.

 I don't think that this is within reach of service operators. It is still
 an open research problem. See also
 https://github.com/torproject/tor/blob/master/doc/HACKING/CircuitPaddingDevelopment.md#14
 -other-deployment-constraints and the rest of that doc (which is the place
 for such info, rather than the vanguards doc).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33815#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list