On Wed, Sep 25, 2013 at 9:32 PM, coderman <coder...@gmail.com> wrote:
>   [... re: NSA has found a way to break Tor... ]
> i suspect it is the latter that is more concerning. of course NSA has
> the ability; but do they share it?


the recent releases[0] have shown this to be more complicated than expected.

in terms of sharing: other domestic agencies and some of the FVEY
partners appear to be partially looped in? likely to find out more
over the years,...


in terms of breaking Tor:

the core Tor protocol and network is described repeatedly as difficult
to compromise. attacking the client, opportunistic de-anonymization,
selective denial of service, and mallory-in-the-middle attacks, all
appear extremely effective when they are pointed at Tor users of
interest. Tor's dependencies are failing in practice, rather than the
network or protocol itself.


Roger says the limited number of users targeted is reassuring, “If
those documents actually represent what they can do, they are not as
big an adversary as I thought,”[1]


the lack of widespread de-anonymization of Tor users is an interesting
situation.  i do not agree that they don't have the ability. other
sources clearly show their privileged positioning in the IP core for
active attacks as well as the global passive DPI tapping
infrastructure technically capable of linking large numbers of Tor
users.[2]

instead this implies that the other routes to identifying users,
particularly taking advantage of the endpoint and operational risks
above, are cheaper and more effective.
for less effort and resources locate them via side channel tricks,
infect them with spyware, and observe what they do
pre-encryption-and-pre-proxy directly.  it's clear to see why they've
been using this approach. [here is where i plug Qubes Tor VM, Tails,
Whonix]


so after addressing the client side weaknesses, perhaps the elligator
datagram based effort[3] will be making progress in time to thwart
this new adversary model as the low hanging fruit of Tor client
cracking dries up...
  ;)


best regards,



0. NSA Tor dox:
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_print.html
http://cryptome.org/2013/10/nsa-iat-tor.pdf
http://cryptome.org/2013/10/nsa-tor.pdf
http://cryptome.org/2013/10/gchq-mullenize.pdf
http://cryptome.org/2013/10/nsa-egotisticalgiraffe.pdf
http://cryptome.org/2013/10/nsa-tor-stinks.pdf
http://cryptome.org/2013/10/packet-stain/packet-staining.htm

1. "Secret NSA documents show campaign against Tor encrypted network"
  
http://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_print.html

2. passing the buck on the math; the details you need:
 https://metrics.torproject.org/index.html /
https://trac.torproject.org/projects/tor/ticket/6443 ,
answer for the question: what is the probability of picking a guard
and exit relay using any of five-eyes-and-their-friendlies AS'es, or
that travels transoceanic cables at these points, or uses guard and
exit relays hosted at an IX under legally compelled (FVEY) or unaware
collaboration (e.g. Belgacom)?

3. sorry, no; there is no Tor datagram protocol in the works yet,
however initial considerations are in progress:
"Implement and experiment with one or more datagram-based designs"
  https://trac.torproject.org/projects/tor/ticket/4684
  http://www.cl.cam.ac.uk/~sjm217/papers/tor11datagramcomparison.pdf
this is summarized as picking from multiple hard to very hard options.
i'm fond of even more difficulty, and combining these techniques and
others (multi-path SCTP in userspace, client-side traffic
shaping/prioritization, stochastic fair queuing and packet reordering,
etc) for better protection against traffic analysis and active
attacks.... might take a while to code up *grin*
-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.

Reply via email to