[tor-relays] Dear OBFS4 bridge operators, please enable timing and packet-size obfuscations to help clients facing timing analysis attacks.

Fran fatal at mailbox.org
Mon Sep 23 20:27:25 UTC 2024


Philipp Winter regarding iat mode:

 >The feature introduces a substantial performance penalty for a dubious
 >and poorly understood privacy gain.  If I were to write an algorithm to
 >detect obfs4, I wouldn't bother dealing with its flow properties; there
 >are easier ways to identify the protocol.  In hindsight, it was >probably
 >a mistake to expose the iat option to users and bridge operators.
 >
 >Cheers,
 >Philipp

https://lists.torproject.org/pipermail/tor-relays/2021-February/019370.html

On 23/09/2024 12:15, George Hartley via tor-relays wrote:
> Hello Tor community,
> 
> this e-mail applies to you if you are running an obfs4 (now known under 
> the name *lyrebird*) bridge or want to do so in the future.
> 
> Some recent posts on this list has shown that traffic timing analysis 
> can be used to locate a users or onion services guard nodes or bridges. 
> This is not really something new.
> 
> For bridge users, there is a way to try to protect themselves against 
> this, but your bridge configuration must support it.
> 
> By enabling iat-mode on your obfs4 /lyrebird bridge, then maybe DPI 
> (Deep Packet Inspection) hardware can sometimes be defeated either 
> entirely, or at least the process of tracking users can be slowed down.
> 
> OBFS4/Lyrebird support two times of traffic obfuscation:
> 
>     ServerTransportOptions obfs4 iat-mode=1
> 
> 
> This will make your bridge send MTU sized packets, in order to make
> true packet size analysis harder.
> 
> There is also what the author of obfs4/Lyrebird called "paranoid mode":
> 
>     ServerTransportOptions obfs4 iat-mode=2
> 
> For each write, a variable length packet will be sent, which will result
> in both making true packet size andround trip time analysis harder.
> 
> If your bridge is distributed by BridgeDB, the next time someone receives
> a batch of bridges with your bridge in it, the bridge-line will have the iat-mode variable set to the one
> you set on your bridge server.
> 
> Your bridge will still work even if you enable these defenses and a user chooses
> to set iat-mode to 0 in his bridge line.
> 
> There is a small performance penalty for both mode 1 and 2, but nothing very severe.
> 
> I believe this, along with Vanguards, and so on, is needed to keep users and services somewhat secure.
> 
> Let me know what you think.
> 
>   * George
> 
> 
> 
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



More information about the tor-relays mailing list