[or-cvs] more on helper nodes
Roger Dingledine
arma at seul.org
Wed Jan 26 11:10:00 UTC 2005
Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper
Modified Files:
challenges.tex
Log Message:
more on helper nodes
Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -d -r1.9 -r1.10
--- challenges.tex 26 Jan 2005 10:46:53 -0000 1.9
+++ challenges.tex 26 Jan 2005 11:09:57 -0000 1.10
@@ -178,7 +178,12 @@
and diversity. george and steven describe an attack \cite{draft} that
lets them determine the nodes used in a circuit; yet they can't identify
alice or bob through this attack. so it's really just the endpoints that
-remain secure. see \ref{subsec:routing-zones} for discussion of larger
+remain secure. and the enclave model seems particularly threatened by
+this, since this attack lets us identify endpoints when they're servers.
+see \ref{subsec:helper-nodes} for discussion of some ways to address this
+issue.
+
+see \ref{subsec:routing-zones} for discussion of larger
adversaries and our dispersal goals.
\section{Crossroads: Policy issues}
@@ -318,13 +323,25 @@
the main reasons they're willing to run Tor over previous attempts
at anonymizing networks. Adding an IDS to handle exit policies would
increase the security complexity of Tor, and would likely not work anyway,
-as evidenced by the entire field of IDS and counter-IDS papers.
+as evidenced by the entire field of IDS and counter-IDS papers. Many
+potential abuse issues are resolved by the fact that Tor only transports
+valid TCP streams (as opposed to arbitrary IP including malformed packets
+and IP floods), so exit policies become even \emph{more} important as
+we become able to transport IP packets. We also need a way to compactly
+characterize the exit policies and let clients parse them to decide
+which nodes will allow which packets to exit.
\item [The Tor-internal name spaces would need to be redesigned.] We
support hidden service \tt{.onion} addresses, and other special addresses
like \tt{.exit} (see Section \ref{subsec:}), by intercepting the addresses
when they are passed to the Tor client.
\end{enumerate}
+This list is discouragingly long right now, but we recognize that it
+would be good to investigate each of these items in further depth and to
+understand which are actual roadblocks and which are easier to resolve
+than we think. We certainly wouldn't mind if Tor one day is able to
+transport a greater variety of protocols.
+
\subsection{Mid-latency}
Mid-latency. Can we do traffic shape to get any defense against George's
@@ -382,6 +399,16 @@
hard. Also, they're brittle in terms of intersection and observation
attacks. Would be nice to have hot-swap services, but hard to design.
+Game theory for helper nodes: if Alice offers a hidden service on a
+server (enclave model), and nobody ever uses helper nodes, then against
+George+Steven's attack she's totally nailed. If only Alice uses a helper
+node, then she's still identified as the source of the data. If everybody
+uses a helper node (including Alice), then the attack identifies the
+helper node and also Alice, and knows which one is which. If everybody
+uses a helper node (but not Alice), then the attacker figures the real
+source was a client that is using Alice as a helper node. [How's my
+logic here?]
+
in practice, sites like bloggers without borders (www.b19s.org) are
running tor servers but more important are advertising a hidden-service
address on their front page. doing this can provide increased robustness
More information about the tor-commits
mailing list