7 December 2013
Is Anonymous Access to TOR Attainable?
Date: Sat, 07 Dec 2013 11:02:10 +0000
From: Ron Leach <ronleach[at]tesco.net>
To: cryptography[at]metzdowd.com
Subject: Re: [Cryptography] Anonymous messaging [was: Email is securable
within a coterie]
On 07/12/2013 05:24, StealthMonger wrote:
"Bob Simmons"<bsimmons[at]compassnet.com> writes:
Of course, if I were to use this for real, I would have to be sure dizum.com
isn't a honeypot.
Hence the virtue of using CHAINS of remailers, so that if even just one of
them is good, your anonymity is secure. (And the step after that is to operate
a remailer yourself so you KNOW one of them is good.)
Are we sure? I read Bob's post as being wary in case the *first* remailer,
dizum.com in his case, which receives his connection and therefore has some
idea who he is, were to be a honeypot. Yes, the CHAIN might ensure his anonymity
at point of posting to the newsgroup, but disclosure will have occurred at
point of first entry to the chain (and, potentially, subsequently for any
honeypots following in the chain until the first genuine remailer).
It's the same problem with TOR, isn't it? The first TOR server knows who
is accessing the network.
Anonymity of *access* is becoming desirable, I think. But is it attainable?
regards, Ron
Date: Sat, 7 Dec 2013 21:26:41 +0000
From: Ben Laurie <ben[at]links.org>
To: Ron Leach <ronleach[at]tesco.net>
Cc: Cryptography Mailing List
<cryptography[at]metzdowd.com>
Subject: Re: [Cryptography] Anonymous messaging [was: Email is securable
within a coterie]
On 7 December 2013 11:02, Ron Leach <ronleach[at]tesco.net> wrote:
It's the same problem with TOR, isn't it? The first TOR server knows who
is accessing the network.
Anonymity of *access* is becoming desirable, I think. But is it attainable?
You mean anonymity of using TOR is becoming desirable, surely? Because everyone
is accessing the network.
Date: Sat, 07 Dec 2013 23:21:37 +0000
From: Ron Leach <ronleach[at]tesco.net>
To: Cryptography Mailing List <cryptography[at]metzdowd.com>
Subject: Re: [Cryptography] Anonymous messaging [was: Email is securable
within a coterie]
On 07/12/2013 21:26, Ben Laurie wrote:
You mean anonymity of using TOR is becoming desirable, surely? Because everyone
is accessing the network.
Yes, in the general sense of accessing any anonymity service (including
remailers, not only TOR). I'd used the word 'network' in the sense of the
'service' (Tor network, remailer network, etc).
Simply meant that *anonymity* of *accessing* TOR, or the 1st remailer in
a chain, is becoming desirable [because the first server could be a honeypot
and reveals the IP address of the accessor, and IP address leads to substantially
more identifying leakage].
May I add this next clarification, simply because readers of this public
list have varying depths of experience with security and anonymity, and may
not be aware of the underlying issues? TOR and remailers attempt to solve
the problem of anonymous deposition of messages or website access, by routing
randomly through other servers. The use of multiple links in a TOR or remailer
chain was (historically) assumed to make more difficult any association between
(i) access to the first server, and (ii) the exit node. But either, or both,
of the entry and exit servers of that service may themselves be honeypots,
and, moreover, capable of sharing their traffic data - even if operated by
different entities - thus facilitating identification of the source of anonymous
traffic.
The TOR project, in their documentation, makes this risk very clear. While
it has always been possible for honeypots to masquerade as genuine severs,
as TOR project explains, it is becoming clear that traffic analysis across
different honeypots operated by different entities is quite possible. This
increases substantially the effectiveness of traffic analysis to identify
the sources of anonymous website accesses or message deposits, etc.
If anonymity is a goal, the anonymity of *use* of such schemes may be desirable,
to try to protect against that type of traffic analysis. Whereas the use
of such services is (relatively) easy to achieve, I was thinking about whether
anonymous access to the first server, however desirable, might or might not
be attainable. As already mentioned, installing the 1st server on one's own
machine might be a way forward, but at a security loss. The opportunity for
random traffic routing through the remainder of the network is reduced, perhaps
substantially. For example, TOR, as I understand it, only uses 3 nodes including
entry and exit so, when hosting one's own entry server, one's own traffic
would only be randomly routed through the last 2 servers, instead of through
a randomly-selected 3 servers, and hence might perhaps be more susceptible
to traffic analysis.
Back to the topic; yes, I meant access to the anonymising service, rather
than access to the network, in the internet-wide sense, which as you say
everyone is accessing.
regards, Ron
_______________________________________________
The cryptography mailing
list
cryptography[at]metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
|