[tor-dev] Two protocols to measure relay-sensitive hidden-service statistics
A. Johnson
aaron.m.johnson at nrl.navy.mil
Wed Jan 14 22:16:12 UTC 2015
>> AnonStats1 doesn’t leak the relay identity. The relay probability is sent over a separate circuit (at a random time). I intentionally did that just to avoid the problem you describe.
>>
>
> Ah, I see, that makes sense.
>
> Some more notes from reading AnonStats1 then:
>
> a) How do relays get more tokens when they deplete the initial 2k
> tokens? Is it easy for the StatAuth to generate 2k such tokens, or
> can relays DoS them by asking for tokens repeatedly?
New tokens are issued for each measurement period (e.g. every 24 hours). The relay should be limited to asking for its allotment once per period.
> b) It seems a bit weird to assume that all relay operators are good
> citizens, but still not trust the rest of the Internet at all
> (that's why we are doing the blind signature scheme, right?).
It doesn’t seem that weird to me. Running a relay requires some level of effort.
> If an outside attacker wanted to influence the results, he could
> still sign up 10 relays on the network, get the blind signature
> tokens, and have them publish anonymized bad statistics, right?
Right.
> That's because the highest counts of both statistics will likely
> correspond to the HSDirs and IPs of the most popular hidden service of
> the network, if the most popular HS has a large user count difference
> from the least popular ones.
I am beginning to think that AnonStats2 is not secure enough to use. The consensus-weight bins were supposed to hide which relays exactly were reporting the statistics, but because the bins of HSDirs and IPs change over time, the adversary could watch the the HSDir/IP bins of a target HS to see if the stats tend to be larger or smaller over their average. This remains the case even if there is just one bin of relays that is allowed to report stats if that bin does not include all HSDirs/IPs that HSes might use.
Also, in AnonStats1 we maybe should require that counts are reported in constant-size chunks over separate circuits. For example, we could have every 100 unique HS descriptors sent in a different upload. This way, for example, a particularly large statistic wouldn’t identify a particularly large HSDir/IP (then if this stat is larger than its normally-large value, that difference could reveal the popularity of a target popular HS).
Best,
Aaron
More information about the tor-dev
mailing list