Re: leaker-optimized versions of Tor
On Wed, Dec 8, 2010 at 10:11 AM, Mitar <mmitar@gmail.com> wrote:
Hi!
Relaxing the realtime constraint, adding random delays, more hops and also chaff trafic in a Tor derivate would arguably make such attacks more difficult.
I am asking just about more hops. Why would more hops be necessary? It is enough that one node introduces random delay and this is it?
It is strictly necessary that the bad guy not control 100% of the forwarding nodes. On a realtime onion network anonymity is bounded by timing attacksb even if you could tolerate the delay of having a zillion middle nodes the attacker could just watch the entrances an exits and correlate timing. So adding a great many hops would not significantly increase security. A mix network can tolerate higher delays and, hopefully, eliminates the timing attacks. So additional hops can be beneficial. The down side is increased vulnerability to DOS attacks if flooders can generate cheap round-the-world messages. The creating a hidden service based overlay network, as was suggested here by Karsten N., was what I thought when I read the threadb but I was concerned that if the network identity of all/most of the nodes is hidden that an attacker could spin up thousands of fake mix nodes without even needing a lot of network resources. They could make it far more likely that all your hops were controlled by one party. Although the risk exists for non hidden service based designs, it's probably much easier with an anonymity layer in between. Any design using hidden services would specifically need to address this risk. *********************************************************************** To unsubscribe, send an e-mail to majordomo@torproject.org with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/ ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
participants (1)
-
Gregory Maxwell