skip to main content
10.1145/2046556.2046569acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

BridgeSPA: improving Tor bridges with single packet authorization

Published: 17 October 2011 Publication History

Abstract

Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a local adversary to determine with whom a particular Tor user is communicating. In response, some local adversaries restrict access to Tor by blocking each of the publicly listed relays. To deal with such an adversary, Tor uses bridges, which are unlisted relays that can be used as alternative entry points into the Tor network. Unfortunately, issues with Tor's bridge implementation make it easy to discover large numbers of bridges. An adversary that hoards this information may use it to determine when each bridge is online over time. If a bridge operator also browses with Tor on the same machine, this information may be sufficient to deanonymize him. We present BridgeSPA as a method to mitigate this issue. A client using BridgeSPA relies on innocuous single packet authorization (SPA) to present a time-limited key to a bridge. Before this authorization takes place, the bridge will not reveal whether it is online. We have implemented BridgeSPA as a working proof-of-concept, which is available under an open-source licence.

References

[1]
FreedomBox. http://wiki.debian.org/FreedomBox. {Online; accessed June 2011}.
[2]
The netfilter.org "libnetfilter_queue" project. http://www.netfilter.org/projects/libnetfilter_queue/index.html. {Online; accessed June 2011}.
[3]
Tor BridgeDB. https://gitweb.torproject.org/bridgedb.git/tree. {Online; accessed June 2011}.
[4]
Tor Metrics Portal. http://metrics.torproject.org. {Online; accessed June 2011}.
[5]
Torouter. https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/Torouter. {Online; accessed June 2011}.
[6]
J. Appelbaum. Port Knocking for Bridge Scanning Resistance. https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/ideas/xxx-port-knocking.txt, April 2009. {Online; accessed June 2011}.
[7]
J. Appelbaum and N. Mathewson. Pluggable transports for circumvention. https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/180-pluggable-transport.txt, October 2010. {Online; accessed June 2011}.
[8]
J. Appelbaum and G. Shufflebottom. Draft spec for TLS certificate and handshake normalization. https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/179-TLS-cert-and-parameter-normalization.txt, February 2011. {Online; accessed June 2011}.
[9]
P. Barham, S. Hand, R. Isaacs, P. Jardetzky, R. Mortier, and T. Roscoe. Techniques for lightweight concealment and authentication in IP networks. Intel Research Berkeley. July, 2002.
[10]
R. Clayton, S. Murdoch, and R. Watson. Ignoring the Great Firewall of China. In Privacy Enhancing Technologies, pages 20--35. Springer-Verlag, 2006.
[11]
R. Dingledine. Behavior for bridge users, bridge relays, and bridge authorities. https://gitweb.torproject.org/torspec.git/blob_plain/HEAD:/proposals/125-bridges.txt, November 2007. {Online; accessed July 2011}.
[12]
R. Dingledine. Re: Guard nodes. http://archives.seul.org/or/dev/Jan-2008/msg00011.html, January 2008. {Online; accessed July 2011}.
[13]
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In In Proceedings of the 13th Usenix Security Symposium, 2004.
[14]
J. Giffin, R. Greenstadt, P. Litwack, and R. Tibbetts. Covert messaging through TCP timestamps. In Proceedings of the 2nd international conference on Privacy enhancing technologies, pages 194--208. Springer-Verlag, 2002.
[15]
E. Goh, D. Boneh, B. Pinkas, and P. Golle. The Design and Implementation of Protocol-Based Hidden Key Recovery. Information Security, pages 165--179, 2003.
[16]
G. Kadianakis. Re: Proposal 176: Proposed version-3 link handshake for Tor. http://archives.seul.org//or//dev/Feb-2011/msg00012.html, February 2011. {Online; accessed June 2011}.
[17]
S. Kent and R. Atkinson. RFC2402: IP Authentication Header. RFC Editor United States, 1998.
[18]
M. Krzywinski. Port knocking: Network authentication across closed ports. SysAdmin Magazine, 12(6):12--17, 2003.
[19]
A. Lewman. China blocking Tor: Round Two. https://blog.torproject.org/blog/china-blocking-tor-round-two, March 2010. {Online; accessed June 2011}.
[20]
J. McLachlan and N. Hopper. On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design. In Proceedings of the 8th ACM workshop on Privacy in the electronic society, pages 31--40. ACM, 2009.
[21]
S. Murdoch and S. Lewis. Embedding covert channels into TCP/IP. In Information Hiding, pages 247--261. Springer, 2005.
[22]
S. Pope. Port-Scanning Resistance in Tor Anonymity Network. Honours thesis, University of Texas at Austin, December 2009. {Online; accessed June 2011}.
[23]
M. Rash. Single packet authorization with fwknop. login: The USENIX Magazine, 31(1):63--69, 2006.
[24]
C. Rowland. Covert channels in the TCP/IP protocol suite. First Monday, 2(5), 1997.
[25]
E. Vasserman, N. Hopper, and J. Tyra. Silent Knock: practical, provably undetectable authentication. International Journal of Information Security, 8(2):121--135, 2009.

Cited By

View all

Index Terms

  1. BridgeSPA: improving Tor bridges with single packet authorization

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
    October 2011
    192 pages
    ISBN:9781450310024
    DOI:10.1145/2046556
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 October 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blocking resistance
    2. port knocking
    3. privacy
    4. tor

    Qualifiers

    • Research-article

    Conference

    CCS'11
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 106 of 355 submissions, 30%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media