> Hidden Servers probably also have value in protecting servers from getting 
> taken down, or their operators harassed.






Definitely yes on the latter. It depends on what you mean by 'taken down' for 
the former: If you mean 'a legal authority ordering a service to be taken down' 
then yes. If you mean 'less susceptible to DOS attacks', then definitely not. 
(This is one of the downsides of HS; it's -- relatively -- trivial to 
permanently DOS a hidden service.





> They also allow the server operator to claim that since the server can only 
> be contacted


over Tor, it's impossible for server to know much about its clients - this 
might help avoid getting drawn into legal investigations.






​It (also?) minimizes the chances that an order granting access to ISP-kept 
IP-connection logs at the server's real endpoint would be proper.* (Alas, a lot 
of ISPs keep IP logs; see, e.g., [1].) This is a big privacy benefit for a Pond 
server (or other HS-only service) operator.










​[1] http://cryptome.org/2014/06/verizon-stratfor-hack.pdf



​*(Assuming that the third-party-doctrine in its strong form is wrong. In 
particular, there is a clear and cheap minimization strategy for discovery that 
doesn't disclose IP addresses.)
—
Sent using alpine: an Alternatively Licensed Program for Internet News and Email

On Sat, Jun 14, 2014 at 4:31 PM, Trevor Perrin <[email protected]> wrote:

> Some e2e messaging protocols make use of Tor Hidden Services.  It's
> interesting to think about what value this adds:
> In Cables [1] and the (work-in-progress) SMTorP [2], recipients can
> run their own Tor Hidden Service.  So if you're online, messages can
> be delivered directly to you without needing a mailbox server.
> The downside:
>  - Tor Hidden Services are easier to de-anonymize than Tor clients, as
> arbitrary traffic can be directed at them [3].
>  - Traffic correlation between sender and receiver is easier than it
> would be in a store-and-forward system.
>  - The recipient is advertising their online / offline status to
> anyone who knows their address.
>  - Correlating sender traffic with the online/offline status of
> potential recipients might be possible.  Consider an attacker who can
> monitor the sender's traffic profile.  If the sender's traffic profile
> suggests they are "polling" for a recipient until time T, then
> delivering a message, that suggests the sender might be communicating
> with a recipient whose hidden service came online shortly before time
> T.
> So a store-and-forward system with many users sharing the same mailbox
> server seems better.  This is how Pond works [4].  But Pond's mailbox
> servers are *also* Hidden Servers.  This may have some benefits, but
> it doesn't seem necessary:
> For user anonymity, users can contact their mailbox server and their
> recipients' mailbox servers over Tor; Hidden Services aren't needed.
> For unlinkability of users with each other, the correlation of packet
> timing and sizes between sender and recipient needs to be broken.  In
> Pond, clients retrieve padded data from their mailbox server at a
> roughly constant rate.  Hidden Services don't help with this.
> Hidden Servers might make it harder to do correlation of traffic
> between sending clients and recipient *servers*, by making the
> recipient server hard to locate.  But if users choose servers run by
> known parties, then this protection is lost.  A better solution would
> probably be high-latency-variance relays (remailers, mix network)
> between sending clients and recipient servers.
> Hidden Servers probably also have value in protecting servers from
> getting taken down, or their operators harassed.  They also allow the
> server operator to claim that since the server can only be contacted
> over Tor, it's impossible for server to know much about its clients -
> this might help avoid getting drawn into legal investigations.
> But it's interesting to note that Pond's dependence on Tor Hidden
> Services is slight.
> Trevor
> [1] http://dee.su/cables
> [2] https://github.com/pagekite/Mailpile/wiki/SMTorP
> [3] http://www.ieee-security.org/TC/SP2013/papers/4977a080.pdf
> [4] https://pond.imperialviolet.org/tech.html
> _______________________________________________
> Messaging mailing list
> [email protected]
> https://moderncrypto.org/mailman/listinfo/messaging
_______________________________________________
Messaging mailing list
[email protected]
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to