Re: [tor-dev] Hidden Service Scaling

2014-05-07 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 06/05/14 22:07, Christopher Baines wrote:
 On 06/05/14 15:29, Michael Rogers wrote:
 Does this mean that at present, the service builds a new IP
 circuit (to a new IP?) every time it receives a connection? If
 so, is it the IP or the service that closes the old circuit?
 
 Not quite. When the service (instance, or instances) select an 
 introduction point, a circuit to that introduction point is built.
 This is a long term circuit, through which the
 RELAY_COMMAND_INTRODUCE2 cells can be sent. This circuit enables
 the IP to contact the service when a client asks it to do so.
 
 Currently, any IP's will close any existing circuits which are for
 a common purpose and service.

Thanks for the explanation!

Cheers,
Michael
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJTair9AAoJEBEET9GfxSfMN80IALQ1dHkYbf/IzoypYqn0pldi
oNC0YoMCmvKFUOpyYClADLns74komcyodfgoNbwbEB1NLlOpeuUn9UubE4HKKAY9
74pTrl9f8uUg1pJ8NaNaoQfiKnEQEO/mdW19cKfleS4ZjG0wbEy15e+GdxokjzXv
tDK3OAzCZPzgaAoHNUzY4ORgKGU7Jy/+AAg06e2GcLzyqGT8tDWQGMtiJUs6Uxci
gB5m1CymjTX6yhGg/UC48y0wg7ty17uIa2SiBBNIQHTOs3DaJLFhGD3oMrIld3YS
3f2kdKkFnbQytTyWKcDPFPDU5N9IcGqVZiV3ozMELxvhBY7aI1Y+joYm3w4SqBk=
=l7Py
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Hidden Service Scaling

2014-05-07 Thread Christopher Baines
On 07/05/14 13:51, Michael Rogers wrote:
 On 06/05/14 22:17, Christopher Baines wrote:
 If so, then yes. When I implemented the deterministic selection of 
 introduction points, I had to implement a reconnection mechanism
 to ensure that the introduction point would only be changed if it
 had failed, and not in the case of intermittent network issues (the
 degree to which I have actually done this might vary).
 
 Is it necessary to know why the circuit broke, or is it sufficient to
 try rebuilding the circuit, and pick a new IP if the old one isn't
 reachable?

I imagine that the service will still have to try connecting via an
alternate route, as even if it was told that the introduction point is
no longer available, it should still check anyway (to avoid being tricked).

 What about the attack suggested by waldo, where a malicious IP
 repeatedly breaks the circuit until it's rebuilt through a malicious
 middle node? Are entry guards enough to protect the service's
 anonymity in that case?

I think it is a valid concern. Assuming the attacker has identified
their node as an IP, and has the corresponding public key. They can then
get the service to create new circuits to their node, buy just causing
the existing ones to fail.

Using guard nodes for those circuits would seem to be helpful, as this
would greatly reduce the chance that the attackers nodes are used in the
first hop.

If guard nodes where used (assuming that they are currently not), you
would have to be careful to act correctly when the guard node fails, in
terms of using a different guard, or selecting a new guard to use
instead (in an attempt to still connect to the introduction point).



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] Hidden Service Scaling

2014-05-07 Thread Michael Rogers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 07/05/14 17:32, Christopher Baines wrote:
 What about the attack suggested by waldo, where a malicious IP 
 repeatedly breaks the circuit until it's rebuilt through a
 malicious middle node? Are entry guards enough to protect the
 service's anonymity in that case?
 
 I think it is a valid concern. Assuming the attacker has
 identified their node as an IP, and has the corresponding public
 key. They can then get the service to create new circuits to their
 node, buy just causing the existing ones to fail.
 
 Using guard nodes for those circuits would seem to be helpful, as
 this would greatly reduce the chance that the attackers nodes are
 used in the first hop.
 
 If guard nodes where used (assuming that they are currently not),
 you would have to be careful to act correctly when the guard node
 fails, in terms of using a different guard, or selecting a new
 guard to use instead (in an attempt to still connect to the
 introduction point).

Perhaps it would make sense to pick one or more IPs per guard, and
change those IPs when the guard is changed? Then waldo's attack by a
malicious IP would only ever discover one guard.

Cheers,
Michael
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBCAAGBQJTam21AAoJEBEET9GfxSfMiLkIAJuEjcF4yYH8L6nJOeSw33r+
aa7ANQPoBE0+dxXssNmFSw6Jw77qfip8LTQrvp58csdoxlh7ckp5wDMD0EqDag8X
98MuD6LRMD2q8MyJWHHYzBIn1SipW0PdTjpckdWlzI/u7ltpLy1ZHtLlpbKOGTKP
pTmG0enWCGP7bpkQeEiJYmCHPbQWxTYJ1lvGdG9EX6DMqWR51FiTJpl5u/eI0JiS
5iLzCuPyP+DCyOBlaxFozujSRnElAKgsIQKz9+NY+bmHFC7tCnh1zE7DikbJlDUd
XmZuzvK2VPuCabtDUegBteeenoyD3gtKKk59OyQUu9YbBz8JfJLY0zEmvTG9Mn4=
=gDUS
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev