[tor-reports] Fwd: [otf-active] January 2016 Report for Tor Bridge Distribution
isis
isis at torproject.org
Thu Feb 11 17:33:56 UTC 2016
----- Forwarded message from isis <isis at torproject.org> -----
> From: isis <isis at torproject.org>
> Subject: [otf-active] January 2016 Report for Tor Bridge Distribution
> Date: Thu, 11 Feb 2016 17:22:14 +0000
> Message-ID: <20160211172214.GA18240 at patternsinthevoid.net>
> To: otf-projects at opentechfund.org, otf-active at opentechfund.org
> Cc: isis <isis at torproject.org>
>
> Hello,
>
> In January 2016, I worked mostly on "little-t tor" code (the actual tor source
> code, as opposed to some other Tor Project codebase), as well as a bit of work
> on Tor Browser's code for handling the builtin Bridges. Here are the hilights:
>
> - Finished implemention — as well as refactoring after review — of a new
> feature for Tor Bridge relays, called "Bridge Guards". [0]
>
> The problem is best outlined by a 2012 paper [1] by some researchers in China
> who determined that the best methods for scraping Bridges out of BridgeDB for
> two weeks would yield the same amount of Bridges as running a Tor middle
> relay. In this approach, the adversary only needs to run a middle relay
> (which anyone can easily do, without the waiting periods required for running
> a Guard relay) and wait for connections from relays which are not listed in
> Tor's consensus. These connections are pretty much guaranteed to be from
> Bridge relays, since no Tor clients would be using that middle relay as a
> Guard. Without counter-measures against this attack, any work to improve
> BridgeDB's defenses against scraping would be less effective.
>
> The solution to this problem is super interesting! As we've known for some
> time, Tor is actually loose-source routed. Essentially, this means that,
> while we always say that a Tor client chooses her three hops — and this is,
> of course, true, in that those hops must be used — nothing in the design of
> Tor's circuit-level cryptography actually prevents extra, additional hops
> from being inserted into the client's circuit, without even the client
> knowing about it. As I mentioned, we've known Tor is loose-source routed for
> a long time, but we've never had a use for that accidental feature… until
> now! :) My patches cause Bridges to select their own Guard node, and inject
> it into their clients' circuits. This means that middle relays now see the
> Bridge Guard connecting to them, rather than the Bridge itself. (See Tor
> Proposal #188 [2] for a full description.)
>
> - Assisted a Bridge relay operator in setting up two new obfs4 Bridges, and
> patched Tor Browser to add them to the list of builtin Bridges. [3] [4]
>
> - Patched Tor Browser to change the default Pluggable Transport type to obfs4,
> [5] as well as to load-balance clients between the default Bridges. [6]
>
> [0]: https://bugs.torproject.org/7144
> [1]: Ling, Zhen, et al. "Extensive analysis and large-scale empirical
> evaluation of tor bridge discovery."
> INFOCOM, 2012 Proceedings IEEE. IEEE, 2012.
> [2]: https://gitweb.torproject.org/torspec.git/tree/proposals/188-bridge-guards.txt
> [3]: https://bugs.torproject.org/18071
> [4]: https://bugs.torproject.org/18104
> [5]: https://bugs.torproject.org/18072
> [6]: https://bugs.torproject.org/18113
>
> Best Regards,
> --
> ♥Ⓐ isis agora lovecruft
> _________________________________________________________
> OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
> Current Keys: https://blog.patternsinthevoid.net/isis.txt
>
> --
> You received this message because you are subscribed to the Google Groups "otf-active" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to otf-active+unsubscribe at opentechfund.org.
> For more options, visit https://groups.google.com/a/opentechfund.org/d/optout.
----- End forwarded message -----
--
♥Ⓐ isis agora lovecruft
_________________________________________________________
OpenPGP: 4096R/0A6A58A14B5946ABDE18E207A3ADB67A2CDB8B35
Current Keys: https://blog.patternsinthevoid.net/isis.txt
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1240 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-reports/attachments/20160211/906099f3/attachment.sig>
More information about the tor-reports
mailing list