[tor-dev] Proposal 302: Hiding onion service clients using WTF-PAD
teor
teor at riseup.net
Tue May 21 03:57:55 UTC 2019
> On 21 May 2019, at 00:35, George Kadianakis <desnacked at riseup.net> wrote:
>
> Tom Ritter <tom at ritter.vg> writes:
>
>>> On Thu, 16 May 2019 at 11:20, George Kadianakis <desnacked at riseup.net> wrote:
>>> 3) Duration of Activity ("DoA")
>>>
>>> The USENIX paper uses the period of time during which circuits send and
>>> receive cells to distinguish circuit types. For example, client-side
>>> introduction circuits are really short lived, wheras service-side
>>> introduction circuits are very long lived. OTOH, rendezvous circuits have
>>> the same median lifetime as general Tor circuits which is 10 minutes.
>>>
>>> We use WTF-PAD to destroy this feature of client-side introduction
>>> circuits by setting a special WTF-PAD option, which keeps the circuits
>>> open for 10 minutes completely mimicking the DoA of general Tor circuits.
>>
>> 10 minutes exactly; or a median of 10 minutes? Wouldn't 10 minutes
>> exactly be a near-perfect distinguisher? And if it's a median of 10
>> minutes, do we know if it follows a normal distribution/what is the
>> shape of the distribution to mimic?
>>
>
> Oops, you are right, Tom.
>
> It's not 10 minutes exactly. The right thing to say is that it's a median
> of 10 minutes, altho I'm not entirely sure of the exact distribution.
>
> These circuits basically now follow the MaxCircuitDirtiness
> configuration like general circuits, and it gets orchestrated by
> circuit_expire_old_circuits_clientside(). Not sure if it's in a spec
> somewhere.
>
> I will update the spec soon with the fix. Thanks!
If I understand correctly, Tor's circuits close about 10 minutes after
the last time they handled traffic.
So that's a *minimum* of 10 minutes. And probably a *median* of
slightly more than 10 minutes, if the user is web browsing.
T
More information about the tor-dev
mailing list