blocking.tex 81 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640
  1. \documentclass{llncs}
  2. \usepackage{url}
  3. \usepackage{amsmath}
  4. \usepackage{epsfig}
  5. \setlength{\textwidth}{5.9in}
  6. \setlength{\textheight}{8.4in}
  7. \setlength{\topmargin}{.5cm}
  8. \setlength{\oddsidemargin}{1cm}
  9. \setlength{\evensidemargin}{1cm}
  10. \newenvironment{tightlist}{\begin{list}{$\bullet$}{
  11. \setlength{\itemsep}{0mm}
  12. \setlength{\parsep}{0mm}
  13. % \setlength{\labelsep}{0mm}
  14. % \setlength{\labelwidth}{0mm}
  15. % \setlength{\topsep}{0mm}
  16. }}{\end{list}}
  17. \begin{document}
  18. \title{Design of a blocking-resistant anonymity system\\DRAFT}
  19. %\author{Roger Dingledine\inst{1} \and Nick Mathewson\inst{1}}
  20. \author{Roger Dingledine \and Nick Mathewson}
  21. \institute{The Free Haven Project\\
  22. \email{\{arma,nickm\}@freehaven.net}}
  23. \maketitle
  24. \pagestyle{plain}
  25. \begin{abstract}
  26. Websites around the world are increasingly being blocked by
  27. government-level firewalls. Many people use anonymizing networks like
  28. Tor to contact sites without letting an attacker trace their activities,
  29. and as an added benefit they are no longer affected by local censorship.
  30. But if the attacker simply denies access to the Tor network itself,
  31. blocked users can no longer benefit from the security Tor offers.
  32. Here we describe a design that builds upon the current Tor network
  33. to provide an anonymizing network that resists blocking
  34. by government-level attackers.
  35. \end{abstract}
  36. \section{Introduction and Goals}
  37. Anonymizing networks such as Tor~\cite{tor-design} bounce traffic around
  38. a network of relays. They aim to hide not only what is being said, but
  39. also who is communicating with whom, which users are using which websites,
  40. and so on. These systems have a broad range of users, including ordinary
  41. citizens who want to avoid being profiled for targeted advertisements,
  42. corporations who don't want to reveal information to their competitors,
  43. and law enforcement and government intelligence agencies who need to do
  44. operations on the Internet without being noticed.
  45. Historically, research on anonymizing systems has focused on a passive
  46. attacker who monitors the user (call her Alice) and tries to discover her
  47. activities, yet lets her reach any piece of the network. In more modern
  48. threat models such as Tor's, the adversary is allowed to perform active
  49. attacks such as modifying communications to trick Alice
  50. into revealing her destination, or intercepting some connections
  51. to run a man-in-the-middle attack. But these systems still assume that
  52. Alice can eventually reach the anonymizing network.
  53. An increasing number of users are using the Tor software
  54. less for its anonymity properties than for its censorship
  55. resistance properties---if they use Tor to access Internet sites like
  56. Wikipedia
  57. and Blogspot, they are no longer affected by local censorship
  58. and firewall rules. In fact, an informal user study (described in
  59. Appendix~\ref{app:geoip}) showed China as the third largest user base
  60. for Tor clients, with perhaps ten thousand people accessing the Tor
  61. network from China each day.
  62. The current Tor design is easy to block if the attacker controls Alice's
  63. connection to the Tor network---by blocking the directory authorities,
  64. by blocking all the server IP addresses in the directory, or by filtering
  65. based on the signature of the Tor TLS handshake. Here we describe a
  66. design that builds upon the current Tor network to provide an anonymizing
  67. network that also resists this blocking. Specifically,
  68. Section~\ref{sec:adversary} discusses our threat model---that is,
  69. the assumptions we make about our adversary; Section~\ref{sec:current-tor}
  70. describes the components of the current Tor design and how they can be
  71. leveraged for a new blocking-resistant design; Section~\ref{sec:related}
  72. explains the features and drawbacks of the currently deployed solutions;
  73. and ...
  74. % The other motivation is for places where we're concerned they will
  75. % try to enumerate a list of Tor users. So even if they're not blocking
  76. % the Tor network, it may be smart to not be visible as connecting to it.
  77. %And adding more different classes of users and goals to the Tor network
  78. %improves the anonymity for all Tor users~\cite{econymics,usability:weis2006}.
  79. % Adding use classes for countering blocking as well as anonymity has
  80. % benefits too. Should add something about how providing undetected
  81. % access to Tor would facilitate people talking to, e.g., govt. authorities
  82. % about threats to public safety etc. in an environment where Tor use
  83. % is not otherwise widespread and would make one stand out.
  84. \section{Adversary assumptions}
  85. \label{sec:adversary}
  86. The history of blocking-resistance designs is littered with conflicting
  87. assumptions about what adversaries to expect and what problems are
  88. in the critical path to a solution. Here we try to enumerate our best
  89. understanding of the current situation around the world.
  90. In the traditional security style, we aim to describe a strong
  91. attacker---if we can defend against this attacker, we inherit protection
  92. against weaker attackers as well. After all, we want a general design
  93. that will work for citizens of China, Iran, Thailand, and other censored
  94. countries; for
  95. whistleblowers in firewalled corporate network; and for people in
  96. unanticipated oppressive situations. In fact, by designing with
  97. a variety of adversaries in mind, we can take advantage of the fact that
  98. adversaries will be in different stages of the arms race at each location,
  99. so a server blocked in one locale can still be useful in others.
  100. We assume there are three main network attacks in use by censors
  101. currently~\cite{clayton:pet2006}:
  102. \begin{tightlist}
  103. \item Block a destination or type of traffic by automatically searching for
  104. certain strings or patterns in TCP packets.
  105. \item Block a destination by manually listing its IP address at the
  106. firewall.
  107. \item Intercept DNS requests and give bogus responses for certain
  108. destination hostnames.
  109. \end{tightlist}
  110. We assume the network firewall has limited CPU and memory per
  111. connection~\cite{clayton:pet2006}. Against an adversary who carefully
  112. examines the contents of every packet, we would need
  113. some stronger mechanism such as steganography, which introduces its
  114. own problems~\cite{active-wardens,tcpstego,bar}.
  115. More broadly, we assume that the authorities are more likely to
  116. block a given system as its popularity grows. That is, a system
  117. used by only a few users will probably never be blocked, whereas a
  118. well-publicized system with many users will receive much more scrutiny.
  119. We assume that readers of blocked content are not in as much danger
  120. as publishers. So far in places like China, the authorities mainly go
  121. after people who publish materials and coordinate organized
  122. movements~\cite{mackinnon}.
  123. If they find that a user happens
  124. to be reading a site that should be blocked, the typical response is
  125. simply to block the site. Of course, even with an encrypted connection,
  126. the adversary may be able to distinguish readers from publishers by
  127. observing whether Alice is mostly downloading bytes or mostly uploading
  128. them---we discuss this issue more in Section~\ref{subsec:upload-padding}.
  129. We assume that while various different regimes can coordinate and share
  130. notes, there will be a time lag between one attacker learning
  131. how to overcome a facet of our design and other attackers picking it up.
  132. Similarly, we assume that in the early stages of deployment the insider
  133. threat isn't as high of a risk, because no attackers have put serious
  134. effort into breaking the system yet.
  135. We do not assume that government-level attackers are always uniform across
  136. the country. For example, there is no single centralized place in China
  137. that coordinates its specific censorship decisions and steps.
  138. We assume that our users have control over their hardware and
  139. software---they don't have any spyware installed, there are no
  140. cameras watching their screens, etc. Unfortunately, in many situations
  141. these threats are real~\cite{zuckerman-threatmodels}; yet
  142. software-based security systems like ours are poorly equipped to handle
  143. a user who is entirely observed and controlled by the adversary. See
  144. Section~\ref{subsec:cafes-and-livecds} for more discussion of what little
  145. we can do about this issue.
  146. We assume that widespread access to the Internet is economically,
  147. politically, and/or
  148. socially valuable to the policymakers of each deployment country. After
  149. all, if censorship
  150. is more important than Internet access, the firewall administrators have
  151. an easy job: they should simply block everything. The corollary to this
  152. assumption is that we should design so that increased blocking of our
  153. system results in increased economic damage or public outcry.
  154. We assume that the user will be able to fetch a genuine
  155. version of Tor, rather than one supplied by the adversary; see
  156. Section~\ref{subsec:trust-chain} for discussion on helping the user
  157. confirm that he has a genuine version and that he can connect to the
  158. real Tor network.
  159. \section{Components of the current Tor design}
  160. \label{sec:current-tor}
  161. Tor is popular and sees a lot of use. It's the largest anonymity
  162. network of its kind.
  163. Tor has attracted more than 800 volunteer-operated routers from around the
  164. world. Tor protects users by routing their traffic through a multiply
  165. encrypted ``circuit'' built of a few randomly selected servers, each of which
  166. can remove only a single layer of encryption. Each server sees only the step
  167. before it and the step after it in the circuit, and so no single server can
  168. learn the connection between a user and her chosen communication partners.
  169. In this section, we examine some of the reasons why Tor has become popular,
  170. with particular emphasis to how we can take advantage of these properties
  171. for a blocking-resistance design.
  172. Tor aims to provide three security properties:
  173. \begin{tightlist}
  174. \item 1. A local network attacker can't learn, or influence, your
  175. destination.
  176. \item 2. No single router in the Tor network can link you to your
  177. destination.
  178. \item 3. The destination, or somebody watching the destination,
  179. can't learn your location.
  180. \end{tightlist}
  181. For blocking-resistance, we care most clearly about the first
  182. property. But as the arms race progresses, the second property
  183. will become important---for example, to discourage an adversary
  184. from volunteering a relay in order to learn that Alice is reading
  185. or posting to certain websites. The third property helps keep users safe from
  186. collaborating websites: consider websites and other Internet services
  187. that have been pressured
  188. recently into revealing the identity of bloggers~\cite{arrested-bloggers}
  189. or treating clients differently depending on their network
  190. location~\cite{google-geolocation}.
  191. % and cite{goodell-syverson06} once it's finalized.
  192. The Tor design provides other features as well that are not typically
  193. present in manual or ad hoc circumvention techniques.
  194. First, the Tor directory authorities automatically aggregate, test,
  195. and publish signed summaries of the available Tor routers. Tor clients
  196. can fetch these summaries to learn which routers are available and
  197. which routers are suitable for their needs. Directory information is cached
  198. throughout the Tor network, so once clients have bootstrapped they never
  199. need to interact with the authorities directly. (To tolerate a minority
  200. of compromised directory authorities, we use a threshold trust scheme---
  201. see Section~\ref{subsec:trust-chain} for details.)
  202. Second, Tor clients can be configured to use any directory authorities
  203. they want. They use the default authorities if no others are specified,
  204. but it's easy to start a separate (or even overlapping) Tor network just
  205. by running a different set of authorities and convincing users to prefer
  206. a modified client. For example, we could launch a distinct Tor network
  207. inside China; some users could even use an aggregate network made up of
  208. both the main network and the China network. (But we should not be too
  209. quick to create other Tor networks---part of Tor's anonymity comes from
  210. users behaving like other users, and there are many unsolved anonymity
  211. questions if different users know about different pieces of the network.)
  212. Third, in addition to automatically learning from the chosen directories
  213. which Tor routers are available and working, Tor takes care of building
  214. paths through the network and rebuilding them as needed. So the user
  215. never has to know how paths are chosen, never has to manually pick
  216. working proxies, and so on. More generally, at its core the Tor protocol
  217. is simply a tool that can build paths given a set of routers. Tor is
  218. quite flexible about how it learns about the routers and how it chooses
  219. the paths. Harvard's Blossom project~\cite{blossom-thesis} makes this
  220. flexibility more concrete: Blossom makes use of Tor not for its security
  221. properties but for its reachability properties. It runs a separate set
  222. of directory authorities, its own set of Tor routers (called the Blossom
  223. network), and uses Tor's flexible path-building to let users view Internet
  224. resources from any point in the Blossom network.
  225. Fourth, Tor separates the role of \emph{internal relay} from the
  226. role of \emph{exit relay}. That is, some volunteers choose just to relay
  227. traffic between Tor users and Tor routers, and others choose to also allow
  228. connections to external Internet resources. Because we don't force all
  229. volunteers to play both roles, we end up with more relays. This increased
  230. diversity in turn is what gives Tor its security: the more options the
  231. user has for her first hop, and the more options she has for her last hop,
  232. the less likely it is that a given attacker will be watching both ends
  233. of her circuit~\cite{tor-design}. As a bonus, because our design attracts
  234. more internal relays that want to help out but don't want to deal with
  235. being an exit relay, we end up with more options for the first hop---the
  236. one most critical to being able to reach the Tor network.
  237. Fifth, Tor is sustainable. Zero-Knowledge Systems offered the commercial
  238. but now defunct Freedom Network~\cite{freedom21-security}, a design with
  239. security comparable to Tor's, but its funding model relied on collecting
  240. money from users to pay relay operators. Modern commercial proxy systems
  241. similarly
  242. need to keep collecting money to support their infrastructure. On the
  243. other hand, Tor has built a self-sustaining community of volunteers who
  244. donate their time and resources. This community trust is rooted in Tor's
  245. open design: we tell the world exactly how Tor works, and we provide all
  246. the source code. Users can decide for themselves, or pay any security
  247. expert to decide, whether it is safe to use. Further, Tor's modularity
  248. as described above, along with its open license, mean that its impact
  249. will continue to grow.
  250. Sixth, Tor has an established user base of hundreds of
  251. thousands of people from around the world. This diversity of
  252. users contributes to sustainability as above: Tor is used by
  253. ordinary citizens, activists, corporations, law enforcement, and
  254. even government and military users~\cite{tor-use-cases}, and they can
  255. only achieve their security goals by blending together in the same
  256. network~\cite{econymics,usability:weis2006}. This user base also provides
  257. something else: hundreds of thousands of different and often-changing
  258. addresses that we can leverage for our blocking-resistance design.
  259. We discuss and adapt these components further in
  260. Section~\ref{sec:bridges}. But first we examine the strengths and
  261. weaknesses of other blocking-resistance approaches, so we can expand
  262. our repertoire of building blocks and ideas.
  263. \section{Current proxy solutions}
  264. \label{sec:related}
  265. Relay-based blocking-resistance schemes generally have two main
  266. components: a relay component and a discovery component. The relay part
  267. encompasses the process of establishing a connection, sending traffic
  268. back and forth, and so on---everything that's done once the user knows
  269. where she's going to connect. Discovery is the step before that: the
  270. process of finding one or more usable relays.
  271. For example, we can divide the pieces of Tor in the previous section
  272. into the process of building paths and sending
  273. traffic over them (relay) and the process of learning from the directory
  274. servers about what routers are available (discovery). With this distinction
  275. in mind, we now examine several categories of relay-based schemes.
  276. \subsection{Centrally-controlled shared proxies}
  277. Existing commercial anonymity solutions (like Anonymizer.com) are based
  278. on a set of single-hop proxies. In these systems, each user connects to
  279. a single proxy, which then relays traffic between the user and her
  280. destination. These public proxy
  281. systems are typically characterized by two features: they control and
  282. operate the proxies centrally, and many different users get assigned
  283. to each proxy.
  284. In terms of the relay component, single proxies provide weak security
  285. compared to systems that distribute trust over multiple relays, since a
  286. compromised proxy can trivially observe all of its users' actions, and
  287. an eavesdropper only needs to watch a single proxy to perform timing
  288. correlation attacks against all its users' traffic and thus learn where
  289. everyone is connecting. Worse, all users
  290. need to trust the proxy company to have good security itself as well as
  291. to not reveal user activities.
  292. On the other hand, single-hop proxies are easier to deploy, and they
  293. can provide better performance than distributed-trust designs like Tor,
  294. since traffic only goes through one relay. They're also more convenient
  295. from the user's perspective---since users entirely trust the proxy,
  296. they can just use their web browser directly.
  297. Whether public proxy schemes are more or less scalable than Tor is
  298. still up for debate: commercial anonymity systems can use some of their
  299. revenue to provision more bandwidth as they grow, whereas volunteer-based
  300. anonymity systems can attract thousands of fast relays to spread the load.
  301. The discovery piece can take several forms. Most commercial anonymous
  302. proxies have one or a handful of commonly known websites, and their users
  303. log in to those websites and relay their traffic through them. When
  304. these websites get blocked (generally soon after the company becomes
  305. popular), if the company cares about users in the blocked areas, they
  306. start renting lots of disparate IP addresses and rotating through them
  307. as they get blocked. They notify their users of new addresses (by email,
  308. for example). It's an arms race, since attackers can sign up to receive the
  309. email too, but operators have one nice trick available to them: because they
  310. have a list of paying subscribers, they can notify certain subscribers
  311. about updates earlier than others.
  312. Access control systems on the proxy let them provide service only to
  313. users with certain characteristics, such as paying customers or people
  314. from certain IP address ranges.
  315. Discovery in the face of a government-level firewall is a complex and
  316. unsolved
  317. topic, and we're stuck in this same arms race ourselves; we explore it
  318. in more detail in Section~\ref{sec:discovery}. But first we examine the
  319. other end of the spectrum---getting volunteers to run the proxies,
  320. and telling only a few people about each proxy.
  321. \subsection{Independent personal proxies}
  322. Personal proxies such as Circumventor~\cite{circumventor} and
  323. CGIProxy~\cite{cgiproxy} use the same technology as the public ones as
  324. far as the relay component goes, but they use a different strategy for
  325. discovery. Rather than managing a few centralized proxies and constantly
  326. getting new addresses for them as the old addresses are blocked, they
  327. aim to have a large number of entirely independent proxies, each managing
  328. its own (much smaller) set of users.
  329. As the Circumventor site explains, ``You don't
  330. actually install the Circumventor \emph{on} the computer that is blocked
  331. from accessing Web sites. You, or a friend of yours, has to install the
  332. Circumventor on some \emph{other} machine which is not censored.''
  333. This tactic has great advantages in terms of blocking-resistance---recall
  334. our assumption in Section~\ref{sec:adversary} that the attention
  335. a system attracts from the attacker is proportional to its number of
  336. users and level of publicity. If each proxy only has a few users, and
  337. there is no central list of proxies, most of them will never get noticed by
  338. the censors.
  339. On the other hand, there's a huge scalability question that so far has
  340. prevented these schemes from being widely useful: how does the fellow
  341. in China find a person in Ohio who will run a Circumventor for him? In
  342. some cases he may know and trust some people on the outside, but in many
  343. cases he's just out of luck. Just as hard, how does a new volunteer in
  344. Ohio find a person in China who needs it?
  345. % another key feature of a proxy run by your uncle is that you
  346. % self-censor, so you're unlikely to bring abuse complaints onto
  347. % your uncle. self-censoring clearly has a downside too, though.
  348. This challenge leads to a hybrid design---centrally-distributed
  349. personal proxies---which we will investigate in more detail in
  350. Section~\ref{sec:discovery}.
  351. \subsection{Open proxies}
  352. Yet another currently used approach to bypassing firewalls is to locate
  353. open and misconfigured proxies on the Internet. A quick Google search
  354. for ``open proxy list'' yields a wide variety of freely available lists
  355. of HTTP, HTTPS, and SOCKS proxies. Many small companies have sprung up
  356. providing more refined lists to paying customers.
  357. There are some downsides to using these open proxies though. First,
  358. the proxies are of widely varying quality in terms of bandwidth and
  359. stability, and many of them are entirely unreachable. Second, unlike
  360. networks of volunteers like Tor, the legality of routing traffic through
  361. these proxies is questionable: it's widely believed that most of them
  362. don't realize what they're offering, and probably wouldn't allow it if
  363. they realized. Third, in many cases the connection to the proxy is
  364. unencrypted, so firewalls that filter based on keywords in IP packets
  365. will not be hindered. And last, many users are suspicious that some
  366. open proxies are a little \emph{too} convenient: are they run by the
  367. adversary, in which case they get to monitor all the user's requests
  368. just as single-hop proxies can?
  369. A distributed-trust design like Tor resolves each of these issues for
  370. the relay component, but a constantly changing set of thousands of open
  371. relays is clearly a useful idea for a discovery component. For example,
  372. users might be able to make use of these proxies to bootstrap their
  373. first introduction into the Tor network.
  374. \subsection{JAP}
  375. Stefan's WPES paper~\cite{koepsell:wpes2004} is probably the closest
  376. related work, and is
  377. the starting point for the design in this paper.
  378. \subsection{steganography}
  379. infranet
  380. \subsection{break your sensitive strings into multiple tcp packets;
  381. ignore RSTs}
  382. \subsection{Internal caching networks}
  383. Freenet is deployed inside China and caches outside content.
  384. \subsection{Skype}
  385. port-hopping. encryption. voice communications not so susceptible to
  386. keystroke loggers (even graphical ones).
  387. \subsection{Tor itself}
  388. And last, we include Tor itself in the list of current solutions
  389. to firewalls. Tens of thousands of people use Tor from countries that
  390. routinely filter their Internet. Tor's website has been blocked in most
  391. of them. But why hasn't the Tor network been blocked yet?
  392. We have several theories. The first is the most straightforward: tens of
  393. thousands of people are simply too few to matter. It may help that Tor is
  394. perceived to be for experts only, and thus not worth attention yet. The
  395. more subtle variant on this theory is that we've positioned Tor in the
  396. public eye as a tool for retaining civil liberties in more free countries,
  397. so perhaps blocking authorities don't view it as a threat. (We revisit
  398. this idea when we consider whether and how to publicize a Tor variant
  399. that improves blocking-resistance---see Section~\ref{subsec:publicity}
  400. for more discussion.)
  401. The broader explanation is that the maintainance of most government-level
  402. filters is aimed at stopping widespread information flow and appearing to be
  403. in control, not by the impossible goal of blocking all possible ways to bypass
  404. censorship. Censors realize that there will always
  405. be ways for a few people to get around the firewall, and as long as Tor
  406. has not publically threatened their control, they see no urgent need to
  407. block it yet.
  408. We should recognize that we're \emph{already} in the arms race. These
  409. constraints can give us insight into the priorities and capabilities of
  410. our various attackers.
  411. \section{The relay component of our blocking-resistant design}
  412. \label{sec:bridges}
  413. Section~\ref{sec:current-tor} describes many reasons why Tor is
  414. well-suited as a building block in our context, but several changes will
  415. allow the design to resist blocking better. The most critical changes are
  416. to get more relay addresses, and to distribute them to users differently.
  417. %We need to address three problems:
  418. %- adapting the relay component of Tor so it resists blocking better.
  419. %- Discovery.
  420. %- Tor's network signature.
  421. %Here we describe the new pieces we need to add to the current Tor design.
  422. \subsection{Bridge relays}
  423. Today, Tor servers operate on less than a thousand distinct IP addresses;
  424. an adversary
  425. could enumerate and block them all with little trouble. To provide a
  426. means of ingress to the network, we need a larger set of entry points, most
  427. of which an adversary won't be able to enumerate easily. Fortunately, we
  428. have such a set: the Tor users.
  429. Hundreds of thousands of people around the world use Tor. We can leverage
  430. our already self-selected user base to produce a list of thousands of
  431. often-changing IP addresses. Specifically, we can give them a little
  432. button in the GUI that says ``Tor for Freedom'', and users who click
  433. the button will turn into \emph{bridge relays} (or just \emph{bridges}
  434. for short). They can rate limit relayed connections to 10 KB/s (almost
  435. nothing for a broadband user in a free country, but plenty for a user
  436. who otherwise has no access at all), and since they are just relaying
  437. bytes back and forth between blocked users and the main Tor network, they
  438. won't need to make any external connections to Internet sites. Because
  439. of this separation of roles, and because we're making use of software
  440. that the volunteers have already installed for their own use, we expect
  441. our scheme to attract and maintain more volunteers than previous schemes.
  442. As usual, there are new anonymity and security implications from running a
  443. bridge relay, particularly from letting people relay traffic through your
  444. Tor client; but we leave this discussion for Section~\ref{sec:security}.
  445. %...need to outline instructions for a Tor config that will publish
  446. %to an alternate directory authority, and for controller commands
  447. %that will do this cleanly.
  448. \subsection{The bridge directory authority}
  449. How do the bridge relays advertise their existence to the world? We
  450. introduce a second new component of the design: a specialized directory
  451. authority that aggregates and tracks bridges. Bridge relays periodically
  452. publish server descriptors (summaries of their keys, locations, etc,
  453. signed by their long-term identity key), just like the relays in the
  454. ``main'' Tor network, but in this case they publish them only to the
  455. bridge directory authorities.
  456. The main difference between bridge authorities and the directory
  457. authorities for the main Tor network is that the main authorities provide
  458. a list of every known relay, but the bridge authorities only give
  459. out a server descriptor if you already know its identity key. That is,
  460. you can keep up-to-date on a bridge's location and other information
  461. once you know about it, but you can't just grab a list of all the bridges.
  462. The identity key, IP address, and directory port for each bridge
  463. authority ship by default with the Tor software, so the bridge relays
  464. can be confident they're publishing to the right location, and the
  465. blocked users can establish an encrypted authenticated channel. See
  466. Section~\ref{subsec:trust-chain} for more discussion of the public key
  467. infrastructure and trust chain.
  468. Bridges use Tor to publish their descriptors privately and securely,
  469. so even an attacker monitoring the bridge directory authority's network
  470. can't make a list of all the addresses contacting the authority.
  471. Bridges may publish to only a subset of the
  472. authorities, to limit the potential impact of an authority compromise.
  473. %\subsection{A simple matter of engineering}
  474. %
  475. %Although we've described bridges and bridge authorities in simple terms
  476. %above, some design modifications and features are needed in the Tor
  477. %codebase to add them. We describe the four main changes here.
  478. %
  479. %Firstly, we need to get smarter about rate limiting:
  480. %Bandwidth classes
  481. %
  482. %Secondly, while users can in fact configure which directory authorities
  483. %they use, we need to add a new type of directory authority and teach
  484. %bridges to fetch directory information from the main authorities while
  485. %publishing server descriptors to the bridge authorities. We're most of
  486. %the way there, since we can already specify attributes for directory
  487. %authorities:
  488. %add a separate flag named ``blocking''.
  489. %
  490. %Thirdly, need to build paths using bridges as the first
  491. %hop. One more hole in the non-clique assumption.
  492. %
  493. %Lastly, since bridge authorities don't answer full network statuses,
  494. %we need to add a new way for users to learn the current status for a
  495. %single relay or a small set of relays---to answer such questions as
  496. %``is it running?'' or ``is it behaving correctly?'' We describe in
  497. %Section~\ref{subsec:enclave-dirs} a way for the bridge authority to
  498. %publish this information without resorting to signing each answer
  499. %individually.
  500. \subsection{Putting them together}
  501. \label{subsec:relay-together}
  502. If a blocked user knows the identity keys of a set of bridge relays, and
  503. he has correct address information for at least one of them, he can use
  504. that one to make a secure connection to the bridge authority and update
  505. his knowledge about the other bridge relays. He can also use it to make
  506. secure connections to the main Tor network and directory servers, so he
  507. can build circuits and connect to the rest of the Internet. All of these
  508. updates happen in the background: from the blocked user's perspective,
  509. he just accesses the Internet via his Tor client like always.
  510. So now we've reduced the problem from how to circumvent the firewall
  511. for all transactions (and how to know that the pages you get have not
  512. been modified by the local attacker) to how to learn about a working
  513. bridge relay.
  514. There's another catch though. We need to make sure that the network
  515. traffic we generate by simply connecting to a bridge relay doesn't stand
  516. out too much.
  517. %The following section describes ways to bootstrap knowledge of your first
  518. %bridge relay, and ways to maintain connectivity once you know a few
  519. %bridge relays.
  520. % (See Section~\ref{subsec:first-bridge} for a discussion
  521. %of exactly what information is sufficient to characterize a bridge relay.)
  522. \section{Hiding Tor's network signatures}
  523. \label{sec:network-signature}
  524. \label{subsec:enclave-dirs}
  525. Currently, Tor uses two protocols for its network communications. The
  526. main protocol uses TLS for encrypted and authenticated communication
  527. between Tor instances. The second protocol is standard HTTP, used for
  528. fetching directory information. All Tor servers listen on their ``ORPort''
  529. for TLS connections, and some of them opt to listen on their ``DirPort''
  530. as well, to serve directory information. Tor servers choose whatever port
  531. numbers they like; the server descriptor they publish to the directory
  532. tells users where to connect.
  533. One format for communicating address information about a bridge relay is
  534. its IP address and DirPort. From there, the user can ask the bridge's
  535. directory cache for an up-to-date copy of its server descriptor, and
  536. learn its current circuit keys, its ORPort, and so on.
  537. However, connecting directly to the directory cache involves a plaintext
  538. HTTP request. A censor could create a network signature for the request
  539. and/or its response, thus preventing these connections. To resolve this
  540. vulnerability, we've modified the Tor protocol so that users can connect
  541. to the directory cache via the main Tor port---they establish a TLS
  542. connection with the bridge as normal, and then send a special ``begindir''
  543. relay command to establish an internal connection to its directory cache.
  544. Therefore a better way to summarize a bridge's address is by its IP
  545. address and ORPort, so all communications between the client and the
  546. bridge will use ordinary TLS. But there are other details that need
  547. more investigation.
  548. What port should bridges pick for their ORPort? We currently recommend
  549. that they listen on port 443 (the default HTTPS port) if they want to
  550. be most useful, because clients behind standard firewalls will have
  551. the best chance to reach them. Is this the best choice in all cases,
  552. or should we encourage some fraction of them pick random ports, or other
  553. ports commonly permitted through firewalls like 53 (DNS) or 110
  554. (POP)? Or perhaps we should use other ports where TLS traffic is
  555. expected, like 993 (IMAPS) or 995 (POP3S). We need more research on our
  556. potential users, and their current and anticipated firewall restrictions.
  557. Furthermore, we need to look at the specifics of Tor's TLS handshake.
  558. Right now Tor uses some predictable strings in its TLS handshakes. For
  559. example, it sets the X.509 organizationName field to ``Tor'', and it puts
  560. the Tor server's nickname in the certificate's commonName field. We
  561. should tweak the handshake protocol so it doesn't rely on any unusual details
  562. in the certificate, yet it remains secure; the certificate itself
  563. should be made to resemble an ordinary HTTPS certificate. We should also try
  564. to make our advertised cipher-suites closer to what an ordinary web server
  565. would support.
  566. Tor's TLS handshake uses two-certificate chains: one certificate
  567. contains the self-signed identity key for
  568. the router, and the second contains a current TLS key, signed by the
  569. identity key. We use these to authenticate that we're talking to the right
  570. router, and to limit the impact of TLS-key exposure. Most (though far from
  571. all) consumer-oriented HTTPS services provide only a single certificate.
  572. These extra certificates may help identify Tor's TLS handshake; instead,
  573. bridges should consider using only a single TLS key certificate signed by
  574. their identity key, and providing the full value of the identity key in an
  575. early handshake cell. More significantly, Tor currently has all clients
  576. present certificates, so that clients are harder to distinguish from servers.
  577. But in a blocking-resistance environment, clients should not present
  578. certificates at all.
  579. Last, what if the adversary starts observing the network traffic even
  580. more closely? Even if our TLS handshake looks innocent, our traffic timing
  581. and volume still look different than a user making a secure web connection
  582. to his bank. The same techniques used in the growing trend to build tools
  583. to recognize encrypted Bittorrent traffic
  584. %~\cite{bt-traffic-shaping}
  585. could be used to identify Tor communication and recognize bridge
  586. relays. Rather than trying to look like encrypted web traffic, we may be
  587. better off trying to blend with some other encrypted network protocol. The
  588. first step is to compare typical network behavior for a Tor client to
  589. typical network behavior for various other protocols. This statistical
  590. cat-and-mouse game is made more complex by the fact that Tor transports a
  591. variety of protocols, and we'll want to automatically handle web browsing
  592. differently from, say, instant messaging.
  593. % Tor cells are 512 bytes each. So TLS records will be roughly
  594. % multiples of this size? How bad is this? -RD
  595. % Look at ``Inferring the Source of Encrypted HTTP Connections''
  596. % by Marc Liberatore and Brian Neil Levine (CCS 2006)
  597. % They substantially flesh out the numbers for the web fingerprinting
  598. % attack. -PS
  599. % Yes, but I meant detecting the signature of Tor traffic itself, not
  600. % learning what websites we're going to. I wouldn't be surprised to
  601. % learn that these are related problems, but it's not obvious to me. -RD
  602. \subsection{Identity keys as part of addressing information}
  603. We have described a way for the blocked user to bootstrap into the
  604. network once he knows the IP address and ORPort of a bridge. What about
  605. local spoofing attacks? That is, since we never learned an identity
  606. key fingerprint for the bridge, a local attacker could intercept our
  607. connection and pretend to be the bridge we had in mind. It turns out
  608. that giving false information isn't that bad---since the Tor client
  609. ships with trusted keys for the bridge directory authority and the Tor
  610. network directory authorities, the user can learn whether he's being
  611. given a real connection to the bridge authorities or not. (After all,
  612. if the adversary intercepts every connection the user makes and gives
  613. him a bad connection each time, there's nothing we can do.)
  614. What about anonymity-breaking attacks from observing traffic, if the
  615. blocked user doesn't start out knowing the identity key of his intended
  616. bridge? The vulnerabilities aren't so bad in this case either---the
  617. adversary could do similar attacks just by monitoring the network
  618. traffic.
  619. % cue paper by steven and george
  620. Once the Tor client has fetched the bridge's server descriptor, it should
  621. remember the identity key fingerprint for that bridge relay. Thus if
  622. the bridge relay moves to a new IP address, the client can query the
  623. bridge directory authority to look up a fresh server descriptor using
  624. this fingerprint.
  625. So we've shown that it's \emph{possible} to bootstrap into the network
  626. just by learning the IP address and ORPort of a bridge, but are there
  627. situations where it's more convenient or more secure to learn the bridge's
  628. identity fingerprint as well as instead, while bootstrapping? We keep
  629. that question in mind as we next investigate bootstrapping and discovery.
  630. \section{Discovering working bridge relays}
  631. \label{sec:discovery}
  632. Tor's modular design means that we can develop a better relay component
  633. independently of developing the discovery component. This modularity's
  634. great promise is that we can pick any discovery approach we like; but the
  635. unfortunate fact is that we have no magic bullet for discovery. We're
  636. in the same arms race as all the other designs we described in
  637. Section~\ref{sec:related}.
  638. In this section we describe a variety of approaches to adding discovery
  639. components for our design.
  640. \subsection{Bootstrapping: finding your first bridge.}
  641. \label{subsec:first-bridge}
  642. In Section~\ref{subsec:relay-together}, we showed that a user who knows
  643. a working bridge address can use it to reach the bridge authority and
  644. to stay connected to the Tor network. But how do new users reach the
  645. bridge authority in the first place? After all, the bridge authority
  646. will be one of the first addresses that a censor blocks.
  647. First, we should recognize that most government firewalls are not
  648. perfect. That is, they may allow connections to Google cache or some
  649. open proxy servers, or they let file-sharing traffic, Skype, instant
  650. messaging, or World-of-Warcraft connections through. Different users will
  651. have different mechanisms for bypassing the firewall initially. Second,
  652. we should remember that most people don't operate in a vacuum; users will
  653. hopefully know other people who are in other situations or have other
  654. resources available. In the rest of this section we develop a toolkit
  655. of different options and mechanisms, so that we can enable users in a
  656. diverse set of contexts to bootstrap into the system.
  657. (For users who can't use any of these techniques, hopefully they know
  658. a friend who can---for example, perhaps the friend already knows some
  659. bridge relay addresses. If they can't get around it at all, then we
  660. can't help them---they should go meet more people or learn more about
  661. the technology running the firewall in their area.)
  662. By deploying all the schemes in the toolkit at once, we let bridges and
  663. blocked users employ the discovery approach that is most appropriate
  664. for their situation.
  665. \subsection{Independent bridges, no central discovery}
  666. The first design is simply to have no centralized discovery component at
  667. all. Volunteers run bridges, and we assume they have some blocked users
  668. in mind and communicate their address information to them out-of-band
  669. (for example, through Gmail). This design allows for small personal
  670. bridges that have only one or a handful of users in mind, but it can
  671. also support an entire community of users. For example, Citizen Lab's
  672. upcoming Psiphon single-hop proxy tool~\cite{psiphon} plans to use this
  673. \emph{social network} approach as its discovery component.
  674. There are several ways to do bootstrapping in this design. In the simple
  675. case, the operator of the bridge informs each chosen user about his
  676. bridge's address information and/or keys. A different approach involves
  677. blocked users introducing new blocked users to the bridges they know.
  678. That is, somebody in the blocked area can pass along a bridge's address to
  679. somebody else they trust. This scheme brings in appealing but complex game
  680. theoretic properties: the blocked user making the decision has an incentive
  681. only to delegate to trustworthy people, since an adversary who learns
  682. the bridge's address and filters it makes it unavailable for both of them.
  683. Also, delegating known bridges to members of your social network can be
  684. dangerous: an the adversary who can learn who knows which bridges may
  685. be able to reconstruct the social network.
  686. Note that a central set of bridge directory authorities can still be
  687. compatible with a decentralized discovery process. That is, how users
  688. first learn about bridges is entirely up to the bridges, but the process
  689. of fetching up-to-date descriptors for them can still proceed as described
  690. in Section~\ref{sec:bridges}. Of course, creating a central place that
  691. knows about all the bridges may not be smart, especially if every other
  692. piece of the system is decentralized. Further, if a user only knows
  693. about one bridge and he loses track of it, it may be quite a hassle to
  694. reach the bridge authority. We address these concerns next.
  695. \subsection{Families of bridges, no central discovery}
  696. Because the blocked users are running our software too, we have many
  697. opportunities to improve usability or robustness. Our second design builds
  698. on the first by encouraging volunteers to run several bridges at once
  699. (or coordinate with other bridge volunteers), such that some
  700. of the bridges are likely to be available at any given time.
  701. The blocked user's Tor client would periodically fetch an updated set of
  702. recommended bridges from any of the working bridges. Now the client can
  703. learn new additions to the bridge pool, and can expire abandoned bridges
  704. or bridges that the adversary has blocked, without the user ever needing
  705. to care. To simplify maintenance of the community's bridge pool, each
  706. community could run its own bridge directory authority---reachable via
  707. the available bridges, and also mirrored at each bridge.
  708. \subsection{Public bridges with central discovery}
  709. What about people who want to volunteer as bridges but don't know any
  710. suitable blocked users? What about people who are blocked but don't
  711. know anybody on the outside? Here we describe how to make use of these
  712. \emph{public bridges} in a way that still makes it hard for the attacker
  713. to learn all of them.
  714. The basic idea is to divide public bridges into a set of pools based on
  715. identity key. Each pool corresponds to a \emph{distribution strategy}:
  716. an approach to distributing its bridge addresses to users. Each strategy
  717. is designed to exercise a different scarce resource or property of
  718. the user.
  719. How do we divide bridges between these strategy pools such that they're
  720. evenly distributed and the allocation is hard to influence or predict,
  721. but also in a way that's amenable to creating more strategies later
  722. on without reshuffling all the pools? We assign a given bridge
  723. to a strategy pool by hashing the bridge's identity key along with a
  724. secret that only the bridge authority knows: the first $n$ bits of this
  725. hash dictate the strategy pool number, where $n$ is a parameter that
  726. describes how many strategy pools we want at this point. We choose $n=3$
  727. to start, so we divide bridges between 8 pools; but as we later invent
  728. new distribution strategies, we can increment $n$ to split the 8 into
  729. 16. Since a bridge can't predict the next bit in its hash, it can't
  730. anticipate which identity key will correspond to a certain new pool
  731. when the pools are split. Further, since the bridge authority doesn't
  732. provide any feedback to the bridge about which strategy pool it's in,
  733. an adversary who signs up bridges with the goal of filling a certain
  734. pool~\cite{casc-rep} will be hindered.
  735. % This algorithm is not ideal. When we split pools, each existing
  736. % pool is cut in half, where half the bridges remain with the
  737. % old distribution policy, and half will be under what the new one
  738. % is. So the new distribution policy inherits a bunch of blocked
  739. % bridges if the old policy was too loose, or a bunch of unblocked
  740. % bridges if its policy was still secure. -RD
  741. %
  742. % I think it should be more chordlike.
  743. % Bridges are allocated to wherever on the ring which is divided
  744. % into arcs (buckets).
  745. % If a bucket gets too full, you can just split it.
  746. % More on this below. -PFS
  747. The first distribution strategy (used for the first pool) publishes bridge
  748. addresses in a time-release fashion. The bridge authority divides the
  749. available bridges into partitions, and each partition is deterministically
  750. available only in certain time windows. That is, over the course of a
  751. given time slot (say, an hour), each requestor is given a random bridge
  752. from within that partition. When the next time slot arrives, a new set
  753. of bridges from the pool are available for discovery. Thus some bridge
  754. address is always available when a new
  755. user arrives, but to learn about all bridges the attacker needs to fetch
  756. all new addresses at every new time slot. By varying the length of the
  757. time slots, we can make it harder for the attacker to guess when to check
  758. back. We expect these bridges will be the first to be blocked, but they'll
  759. help the system bootstrap until they \emph{do} get blocked. Further,
  760. remember that we're dealing with different blocking regimes around the
  761. world that will progress at different rates---so this pool will still
  762. be useful to some users even as the arms races progress.
  763. The second distribution strategy publishes bridge addresses based on the IP
  764. address of the requesting user. Specifically, the bridge authority will
  765. divide the available bridges in the pool into a bunch of partitions
  766. (as in the first distribution scheme), hash the requestor's IP address
  767. with a secret of its own (as in the above allocation scheme for creating
  768. pools), and give the requestor a random bridge from the appropriate
  769. partition. To raise the bar, we should discard the last octet of the
  770. IP address before inputting it to the hash function, so an attacker
  771. who only controls a single ``/24'' network only counts as one user. A
  772. large attacker like China will still be able to control many addresses,
  773. but the hassle of establishing connections from each network (or spoofing
  774. TCP connections) may still slow them down. Similarly, as a special case,
  775. we should treat IP addresses that are Tor exit nodes as all being on
  776. the same network.
  777. The third strategy combines the time-based and location-based
  778. strategies to further constrain and rate-limit the available bridge
  779. addresses. Specifically, the bridge address provided in a given time
  780. slot to a given network location is deterministic within the partition,
  781. rather than chosen randomly each time from the partition. Thus, repeated
  782. requests during that time slot from a given network are given the same
  783. bridge address as the first request.
  784. The fourth strategy is based on Circumventor's discovery strategy.
  785. The Circumventor project, realizing that its adoption will remain limited
  786. if it has no central coordination mechanism, has started a mailing list to
  787. distribute new proxy addresses every few days. From experimentation it
  788. seems they have concluded that sending updates every three or four days
  789. is sufficient to stay ahead of the current attackers.
  790. The fifth strategy provides an alternative approach to a mailing list:
  791. users provide an email address and receive an automated response
  792. listing an available bridge address. We could limit one response per
  793. email address. To further rate limit queries, we could require a CAPTCHA
  794. solution
  795. %~\cite{captcha}
  796. in each case too. In fact, we wouldn't need to
  797. implement the CAPTCHA on our side: if we only deliver bridge addresses
  798. to Yahoo or GMail addresses, we can leverage the rate-limiting schemes
  799. that other parties already impose for account creation.
  800. The sixth strategy ties in the social network design with public
  801. bridges and a reputation system. We pick some seeds---trusted people in
  802. blocked areas---and give them each a few dozen bridge addresses and a few
  803. \emph{delegation tokens}. We run a website next to the bridge authority,
  804. where users can log in (they connect via Tor, and they don't need to
  805. provide actual identities, just persistent pseudonyms). Users can delegate
  806. trust to other people they know by giving them a token, which can be
  807. exchanged for a new account on the website. Accounts in ``good standing''
  808. then accrue new bridge addresses and new tokens. As usual, reputation
  809. schemes bring in a host of new complexities~\cite{rep-anon}: how do we
  810. decide that an account is in good standing? We could tie reputation
  811. to whether the bridges they're told about have been blocked---see
  812. Section~\ref{subsec:geoip} below for initial thoughts on how to discover
  813. whether bridges have been blocked. We could track reputation between
  814. accounts (if you delegate to somebody who screws up, it impacts you too),
  815. or we could use blinded delegation tokens~\cite{chaum-blind} to prevent
  816. the website from mapping the seeds' social network. We put off deeper
  817. discussion of the social network reputation strategy for future work.
  818. Pools seven and eight are held in reserve, in case our currently deployed
  819. tricks all fail at once and the adversary blocks all those bridges---so
  820. we can adapt and move to new approaches quickly, and have some bridges
  821. immediately available for the new schemes. New strategies might be based
  822. on some other scarce resource, such as relaying traffic for others or
  823. other proof of energy spent. (We might also worry about the incentives
  824. for bridges that sign up and get allocated to the reserve pools: will they
  825. be unhappy that they're not being used? But this is a transient problem:
  826. if Tor users are bridges by default, nobody will mind not being used yet.
  827. See also Section~\ref{subsec:incentives}.)
  828. %Is it useful to load balance which bridges are handed out? The above
  829. %pool concept makes some bridges wildly popular and others less so.
  830. %But I guess that's the point.
  831. \subsection{Public bridges with coordinated discovery}
  832. We presented the above discovery strategies in the context of a single
  833. bridge directory authority, but in practice we will want to distribute the
  834. operations over several bridge authorities---a single point of failure
  835. or attack is a bad move. The first answer is to run several independent
  836. bridge directory authorities, and bridges gravitate to one based on
  837. their identity key. The better answer would be some federation of bridge
  838. authorities that work together to provide redundancy but don't introduce
  839. new security issues. We could even imagine designs where the bridge
  840. authorities have encrypted versions of the bridge's server descriptors,
  841. and the users learn a decryption key that they keep private when they
  842. first hear about the bridge---this way the bridge authorities would not
  843. be able to learn the IP address of the bridges.
  844. We leave this design question for future work.
  845. \subsection{Assessing whether bridges are useful}
  846. Learning whether a bridge is useful is important in the bridge authority's
  847. decision to include it in responses to blocked users. For example, if
  848. we end up with a list of thousands of bridges and only a few dozen of
  849. them are reachable right now, most blocked users will not end up knowing
  850. about working bridges.
  851. There are three components for assessing how useful a bridge is. First,
  852. is it reachable from the public Internet? Second, what proportion of
  853. the time is it available? Third, is it blocked in certain jurisdictions?
  854. The first component can be tested just as we test reachability of
  855. ordinary Tor servers. Specifically, the bridges do a self-test---connect
  856. to themselves via the Tor network---before they are willing to
  857. publish their descriptor, to make sure they're not obviously broken or
  858. misconfigured. Once the bridges publish, the bridge authority also tests
  859. reachability to make sure they're not confused or outright lying.
  860. The second component can be measured and tracked by the bridge authority.
  861. By doing periodic reachability tests, we can get a sense of how often the
  862. bridge is available. More complex tests will involve bandwidth-intensive
  863. checks to force the bridge to commit resources in order to be counted as
  864. available. We need to evaluate how the relationship of uptime percentage
  865. should weigh into our choice of which bridges to advertise. We leave
  866. this to future work.
  867. The third component is perhaps the trickiest: with many different
  868. adversaries out there, how do we keep track of which adversaries have
  869. blocked which bridges, and how do we learn about new blocks as they
  870. occur? We examine this problem next.
  871. \subsection{How do we know if a bridge relay has been blocked?}
  872. \label{subsec:geoip}
  873. There are two main mechanisms for testing whether bridges are reachable
  874. from inside each blocked area: active testing via users, and passive
  875. testing via bridges.
  876. In the case of active testing, certain users inside each area
  877. sign up as testing relays. The bridge authorities can then use a
  878. Blossom-like~\cite{blossom-thesis} system to build circuits through them
  879. to each bridge and see if it can establish the connection. But how do
  880. we pick the users? If we ask random users to do the testing (or if we
  881. solicit volunteers from the users), the adversary should sign up so he
  882. can enumerate the bridges we test. Indeed, even if we hand-select our
  883. testers, the adversary might still discover their location and monitor
  884. their network activity to learn bridge addresses.
  885. Another answer is not to measure directly, but rather let the bridges
  886. report whether they're being used.
  887. %If they periodically report to their
  888. %bridge directory authority how much use they're seeing, perhaps the
  889. %authority can make smart decisions from there.
  890. Specifically, bridges should install a GeoIP database such as the public
  891. IP-To-Country list~\cite{ip-to-country}, and then periodically report to the
  892. bridge authorities which countries they're seeing use from. This data
  893. would help us track which countries are making use of the bridge design,
  894. and can also let us learn about new steps the adversary has taken in
  895. the arms race. (The compressed GeoIP database is only several hundred
  896. kilobytes, and we could even automate the update process by serving it
  897. from the bridge authorities.)
  898. More analysis of this passive reachability
  899. testing design is needed to resolve its many edge cases: for example,
  900. if a bridge stops seeing use from a certain area, does that mean the
  901. bridge is blocked or does that mean those users are asleep?
  902. There are many more problems with the general concept of detecting whether
  903. bridges are blocked. First, different zones of the Internet are blocked
  904. in different ways, and the actual firewall jurisdictions do not match
  905. country borders. Our bridge scheme could help us map out the topology
  906. of the censored Internet, but this is a huge task. More generally,
  907. if a bridge relay isn't reachable, is that because of a network block
  908. somewhere, because of a problem at the bridge relay, or just a temporary
  909. outage somewhere in between? And last, an attacker could poison our
  910. bridge database by signing up already-blocked bridges. In this case,
  911. if we're stingy giving out bridge addresses, users in that country won't
  912. learn working bridges.
  913. All of these issues are made more complex when we try to integrate this
  914. testing into our social network reputation system above.
  915. Since in that case we punish or reward users based on whether bridges
  916. get blocked, the adversary has new attacks to trick or bog down the
  917. reputation tracking. Indeed, the bridge authority doesn't even know
  918. what zone the blocked user is in, so do we blame him for any possible
  919. censored zone, or what?
  920. Clearly more analysis is required. The eventual solution will probably
  921. involve a combination of passive measurement via GeoIP and active
  922. measurement from trusted testers. More generally, we can use the passive
  923. feedback mechanism to track usage of the bridge network as a whole---which
  924. would let us respond to attacks and adapt the design, and it would also
  925. let the general public track the progress of the project.
  926. %Worry: the adversary could choose not to block bridges but just record
  927. %connections to them. So be it, I guess.
  928. \subsection{Advantages of deploying all solutions at once}
  929. For once, we're not in the position of the defender: we don't have to
  930. defend against every possible filtering scheme; we just have to defend
  931. against at least one. On the flip side, the attacker is forced to guess
  932. how to allocate his resources to defend against each of these discovery
  933. strategies. So by deploying all of our strategies at once, we not only
  934. increase our chances of finding one that the adversary has difficulty
  935. blocking, but we actually make \emph{all} of the strategies more robust
  936. in the face of an adversary with limited resources.
  937. %\subsection{Remaining unsorted notes}
  938. %In the first subsection we describe how to find a first bridge.
  939. %Going to be an arms race. Need a bag of tricks. Hard to say
  940. %which ones will work. Don't spend them all at once.
  941. %Some techniques are sufficient to get us an IP address and a port,
  942. %and others can get us IP:port:key. Lay out some plausible options
  943. %for how users can bootstrap into learning their first bridge.
  944. %\section{The account / reputation system}
  945. %\section{Social networks with directory-side support}
  946. %\label{sec:accounts}
  947. %One answer is to measure based on whether the bridge addresses
  948. %we give it end up blocked. But how do we decide if they get blocked?
  949. %Perhaps each bridge should be known by a single bridge directory
  950. %authority. This makes it easier to trace which users have learned about
  951. %it, so easier to blame or reward. It also makes things more brittle,
  952. %since loss of that authority means its bridges aren't advertised until
  953. %they switch, and means its bridge users are sad too.
  954. %(Need a slick hash algorithm that will map our identity key to a
  955. %bridge authority, in a way that's sticky even when we add bridge
  956. %directory authorities, but isn't sticky when our authority goes
  957. %away. Does this exist?)
  958. %\subsection{Discovery based on social networks}
  959. %A token that can be exchanged at the bridge authority (assuming you
  960. %can reach it) for a new bridge address.
  961. %The account server runs as a Tor controller for the bridge authority.
  962. %Users can establish reputations, perhaps based on social network
  963. %connectivity, perhaps based on not getting their bridge relays blocked,
  964. %Probably the most critical lesson learned in past work on reputation
  965. %systems in privacy-oriented environments~\cite{rep-anon} is the need for
  966. %verifiable transactions. That is, the entity computing and advertising
  967. %reputations for participants needs to actually learn in a convincing
  968. %way that a given transaction was successful or unsuccessful.
  969. %(Lesson from designing reputation systems~\cite{rep-anon}: easy to
  970. %reward good behavior, hard to punish bad behavior.
  971. \section{Security considerations}
  972. \label{sec:security}
  973. \subsection{Possession of Tor in oppressed areas}
  974. Many people speculate that installing and using a Tor client in areas with
  975. particularly extreme firewalls is a high risk---and the risk increases
  976. as the firewall gets more restrictive. This notion certain has merit, but
  977. there's
  978. a counter pressure as well: as the firewall gets more restrictive, more
  979. ordinary people behind it end up using Tor for more mainstream activities,
  980. such as learning
  981. about Wall Street prices or looking at pictures of women's ankles. So
  982. as the restrictive firewall pushes up the number of Tor users, the
  983. ``typical'' Tor user becomes more mainstream, and therefore mere
  984. use or possession of the Tor software is not so surprising.
  985. It's hard to say which of these pressures will ultimately win out,
  986. but we should keep both sides of the issue in mind.
  987. %Nick, want to rewrite/elaborate on this section?
  988. \subsection{Observers can tell who is publishing and who is reading}
  989. \label{subsec:upload-padding}
  990. Tor encrypts traffic on the local network, and it obscures the eventual
  991. destination of the communication, but it doesn't do much to obscure the
  992. traffic volume. In particular, a user publishing a home video will have a
  993. different network signature than a user reading an online news article.
  994. Based on our assumption in Section~\ref{sec:assumptions} that users who
  995. publish material are in more danger, should we work to improve Tor's
  996. security in this situation?
  997. In the general case this is an extremely challenging task:
  998. effective \emph{end-to-end traffic confirmation attacks}
  999. are known where the adversary observes the origin and the
  1000. destination of traffic and confirms that they are part of the
  1001. same communication~\cite{danezis:pet2004,e2e-traffic}. Related are
  1002. \emph{website fingerprinting attacks}, where the adversary downloads
  1003. a few hundred popular websites, makes a set of "signatures" for each
  1004. site, and then observes the target Tor client's traffic to look for
  1005. a match~\cite{pet05-bissias,defensive-dropping}. But can we do better
  1006. against a limited adversary who just does coarse-grained sweeps looking
  1007. for unusually prolific publishers?
  1008. One answer is for bridge users to automatically send bursts of padding
  1009. traffic periodically. (This traffic can be implemented in terms of
  1010. long-range drop cells, which are already part of the Tor specification.)
  1011. Of course, convincingly simulating an actual human publishing interesting
  1012. content is a difficult arms race, but it may be worthwhile to at least
  1013. start the race. More research remains.
  1014. \subsection{Anonymity effects from acting as a bridge relay}
  1015. Against some attacks, relaying traffic for others can improve
  1016. anonymity. The simplest example is an attacker who owns a small number
  1017. of Tor servers. He will see a connection from the bridge, but he won't
  1018. be able to know whether the connection originated there or was relayed
  1019. from somebody else. More generally, the mere uncertainty of whether the
  1020. traffic originated from that user may be helpful.
  1021. There are some cases where it doesn't seem to help: if an attacker can
  1022. watch all of the bridge's incoming and outgoing traffic, then it's easy
  1023. to learn which connections were relayed and which started there. (In this
  1024. case he still doesn't know the final destinations unless he is watching
  1025. them too, but in this case bridges are no better off than if they were
  1026. an ordinary client.)
  1027. There are also some potential downsides to running a bridge. First, while
  1028. we try to make it hard to enumerate all bridges, it's still possible to
  1029. learn about some of them, and for some people just the fact that they're
  1030. running one might signal to an attacker that they place a higher value
  1031. on their anonymity. Second, there are some more esoteric attacks on Tor
  1032. relays that are not as well-understood or well-tested---for example, an
  1033. attacker may be able to ``observe'' whether the bridge is sending traffic
  1034. even if he can't actually watch its network, by relaying traffic through
  1035. it and noticing changes in traffic timing~\cite{attack-tor-oak05}. On
  1036. the other hand, it may be that limiting the bandwidth the bridge is
  1037. willing to relay will allow this sort of attacker to determine if it's
  1038. being used as a bridge but not easily learn whether it is adding traffic
  1039. of its own.
  1040. We also need to examine how entry guards fit in. Entry guards
  1041. (a small set of nodes that are always used for the first
  1042. step in a circuit) help protect against certain attacks
  1043. where the attacker runs a few Tor servers and waits for
  1044. the user to choose these servers as the beginning and end of her
  1045. circuit\footnote{http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ\#EntryGuards}.
  1046. If the blocked user doesn't use the bridge's entry guards, then the bridge
  1047. doesn't gain as much cover benefit. On the other hand, what design changes
  1048. are needed for the blocked user to use the bridge's entry guards without
  1049. learning what they are (this seems hard), and even if we solve that,
  1050. do they then need to use the guards' guards and so on down the line?
  1051. It is an open research question whether the benefits of running a bridge
  1052. outweigh the risks. A lot of the decision rests on which attacks the
  1053. users are most worried about. For most users, we don't think running a
  1054. bridge relay will be that damaging, and it could help quite a bit.
  1055. \subsection{Trusting local hardware: Internet cafes and LiveCDs}
  1056. \label{subsec:cafes-and-livecds}
  1057. Assuming that users have their own trusted hardware is not
  1058. always reasonable.
  1059. For Internet cafe Windows computers that let you attach your own USB key,
  1060. a USB-based Tor image would be smart. There's Torpark, and hopefully
  1061. there will be more thoroughly analyzed options down the road. Worries
  1062. remain about hardware or
  1063. software keyloggers and other spyware---and physical surveillance.
  1064. If the system lets you boot from a CD or from a USB key, you can gain
  1065. a bit more security by bringing a privacy LiveCD with you. (This
  1066. approach isn't foolproof of course, since hardware
  1067. keyloggers and physical surveillance are still a worry).
  1068. In fact, LiveCDs are also useful if it's your own hardware, since it's
  1069. easier to avoid leaving private data and logs scattered around the
  1070. system.
  1071. %\subsection{Forward compatibility and retiring bridge authorities}
  1072. %
  1073. %Eventually we'll want to change the identity key and/or location
  1074. %of a bridge authority. How do we do this mostly cleanly?
  1075. \subsection{The trust chain}
  1076. \label{subsec:trust-chain}
  1077. Tor's ``public key infrastructure'' provides a chain of trust to
  1078. let users verify that they're actually talking to the right servers.
  1079. There are four pieces to this trust chain.
  1080. First, when Tor clients are establishing circuits, at each step
  1081. they demand that the next Tor server in the path prove knowledge of
  1082. its private key~\cite{tor-design}. This step prevents the first node
  1083. in the path from just spoofing the rest of the path. Second, the
  1084. Tor directory authorities provide a signed list of servers along with
  1085. their public keys---so unless the adversary can control a threshold
  1086. of directory authorities, he can't trick the Tor client into using other
  1087. Tor servers. Third, the location and keys of the directory authorities,
  1088. in turn, is hard-coded in the Tor source code---so as long as the user
  1089. got a genuine version of Tor, he can know that he is using the genuine
  1090. Tor network. And last, the source code and other packages are signed
  1091. with the GPG keys of the Tor developers, so users can confirm that they
  1092. did in fact download a genuine version of Tor.
  1093. In the case of blocked users contacting bridges and bridge directory
  1094. authorities, the same logic applies in parallel: the blocked users fetch
  1095. information from both the bridge authorities and the directory authorities
  1096. for the `main' Tor network, and they combine this information locally.
  1097. How can a user in an oppressed country know that he has the correct
  1098. key fingerprints for the developers? As with other security systems, it
  1099. ultimately comes down to human interaction. The keys are signed by dozens
  1100. of people around the world, and we have to hope that our users have met
  1101. enough people in the PGP web of trust
  1102. %~\cite{pgp-wot}
  1103. that they can learn
  1104. the correct keys. For users that aren't connected to the global security
  1105. community, though, this question remains a critical weakness.
  1106. %\subsection{Security through obscurity: publishing our design}
  1107. %Many other schemes like dynaweb use the typical arms race strategy of
  1108. %not publishing their plans. Our goal here is to produce a design---a
  1109. %framework---that can be public and still secure. Where's the tradeoff?
  1110. \section{Performance improvements}
  1111. \label{sec:performance}
  1112. \subsection{Fetch server descriptors just-in-time}
  1113. I guess we should encourage most places to do this, so blocked
  1114. users don't stand out.
  1115. network-status and directory optimizations. caching better. partitioning
  1116. issues?
  1117. \section{Maintaining reachability}
  1118. \subsection{How many bridge relays should you know about?}
  1119. If they're ordinary Tor users on cable modem or DSL, many of them will
  1120. disappear and/or move periodically. How many bridge relays should a
  1121. blockee know
  1122. about before he's likely to have at least one reachable at any given point?
  1123. How do we factor in a parameter for "speed that his bridges get discovered
  1124. and blocked"?
  1125. The related question is: if the bridge relays change IP addresses
  1126. periodically, how often does the bridge user need to "check in" in order
  1127. to keep from being cut out of the loop?
  1128. Families of bridges: give out 4 or 8 at once, bound together.
  1129. \subsection{Cablemodem users don't provide important websites}
  1130. \label{subsec:block-cable}
  1131. ...so our adversary could just block all DSL and cablemodem networks,
  1132. and for the most part only our bridge relays would be affected.
  1133. The first answer is to aim to get volunteers both from traditionally
  1134. ``consumer'' networks and also from traditionally ``producer'' networks.
  1135. The second answer (not so good) would be to encourage more use of consumer
  1136. networks for popular and useful websites. (But P2P exists; minor websites
  1137. exist; gaming exists; IM exists; ...)
  1138. Other attack: China pressures Verizon to discourage its users from
  1139. running bridges.
  1140. \subsection{Scanning-resistance}
  1141. If it's trivial to verify that we're a bridge, and we run on a predictable
  1142. port, then it's conceivable our attacker would scan the whole Internet
  1143. looking for bridges. (In fact, he can just scan likely networks like
  1144. cablemodem and DSL services---see Section~\ref{block-cable} for a related
  1145. attack.) It would be nice to slow down this attack. It would
  1146. be even nicer to make it hard to learn whether we're a bridge without
  1147. first knowing some secret.
  1148. Password protecting the bridges.
  1149. Could provide a password to the bridge user. He provides a nonced hash of
  1150. it or something when he connects. We'd need to give him an ID key for the
  1151. bridge too, and wait to present the password until we've TLSed, else the
  1152. adversary can pretend to be the bridge and MITM him to learn the password.
  1153. We could some kind of ID-based knocking protocol, or we could act like an
  1154. unconfigured HTTPS server if treated like one.
  1155. We can assume that the attacker can easily recognize https connections
  1156. to unknown servers. It can then attempt to connect to them and block
  1157. connections to servers that seem suspicious. It may be that password
  1158. protected web sites will not be suspicious in general, in which case
  1159. that may be the easiest way to give controlled access to the bridge.
  1160. If such sites that have no other overt features are automatically
  1161. blocked when detected, then we may need to be more subtle.
  1162. Possibilities include serving an innocuous web page if a TLS encrypted
  1163. request is received without the authorization needed to access the Tor
  1164. network and only responding to a requested access to the Tor network
  1165. of proper authentication is given. If an unauthenticated request to
  1166. access the Tor network is sent, the bridge should respond as if
  1167. it has received a message it does not understand (as would be the
  1168. case were it not a bridge).
  1169. \subsection{How to motivate people to run bridge relays}
  1170. \label{subsec:incentives}
  1171. One of the traditional ways to get people to run software that benefits
  1172. others is to give them motivation to install it themselves. An often
  1173. suggested approach is to install it as a stunning screensaver so everybody
  1174. will be pleased to run it. We take a similar approach here, by leveraging
  1175. the fact that these users are already interested in protecting their
  1176. own Internet traffic, so they will install and run the software.
  1177. Make all Tor users become bridges if they're reachable---needs more work
  1178. on usability first, but we're making progress.
  1179. Also, we can make a snazzy network graph with Vidalia that emphasizes
  1180. the connections the bridge user is currently relaying. (Minor anonymity
  1181. implications, but hey.) (In many cases there won't be much activity,
  1182. so this may backfire. Or it may be better suited to full-fledged Tor
  1183. servers.)
  1184. % Also consider everybody-a-server. Many of the scalability questions
  1185. % are easier when you're talking about making everybody a bridge.
  1186. %\subsection{What if the clients can't install software?}
  1187. %[this section should probably move to the related work section,
  1188. %or just disappear entirely.]
  1189. %Bridge users without Tor software
  1190. %Bridge relays could always open their socks proxy. This is bad though,
  1191. %first
  1192. %because bridges learn the bridge users' destinations, and second because
  1193. %we've learned that open socks proxies tend to attract abusive users who
  1194. %have no idea they're using Tor.
  1195. %Bridges could require passwords in the socks handshake (not supported
  1196. %by most software including Firefox). Or they could run web proxies
  1197. %that require authentication and then pass the requests into Tor. This
  1198. %approach is probably a good way to help bootstrap the Psiphon network,
  1199. %if one of its barriers to deployment is a lack of volunteers willing
  1200. %to exit directly to websites. But it clearly drops some of the nice
  1201. %anonymity and security features Tor provides.
  1202. %A hybrid approach where the user gets his anonymity from Tor but his
  1203. %software-less use from a web proxy running on a trusted machine on the
  1204. %free side.
  1205. \subsection{Publicity attracts attention}
  1206. \label{subsec:publicity}
  1207. Many people working on this field want to publicize the existence
  1208. and extent of censorship concurrently with the deployment of their
  1209. circumvention software. The easy reason for this two-pronged push is
  1210. to attract volunteers for running proxies in their systems; but in many
  1211. cases their main goal is not to build the software, but rather to educate
  1212. the world about the censorship. The media also tries to do its part by
  1213. broadcasting the existence of each new circumvention system.
  1214. But at the same time, this publicity attracts the attention of the
  1215. censors. We can slow down the arms race by not attracting as much
  1216. attention, and just spreading by word of mouth. If our goal is to
  1217. establish a solid social network of bridges and bridge users before
  1218. the adversary gets involved, does this attention tradeoff work to our
  1219. advantage?
  1220. \subsection{The Tor website: how to get the software}
  1221. One of the first censoring attacks against a system like ours is to
  1222. block the website and make the software itself hard to find. After
  1223. all, our system works well once the user is running an authentic
  1224. copy of Tor and has found a working bridge, but up until that point
  1225. we need to rely on their individual skills and ingenuity.
  1226. Right now, most countries that block access to Tor block only the main
  1227. website and leave mirrors and the network itself untouched.
  1228. Falling back on word-of-mouth is always a good last resort, but we should
  1229. also take steps to make sure it's relatively easy for users to get a copy.
  1230. See Section~\ref{subsec:first-bridge} for more discussion.
  1231. \section{Future designs}
  1232. \subsection{Bridges inside the blocked network too}
  1233. Assuming actually crossing the firewall is the risky part of the
  1234. operation, can we have some bridge relays inside the blocked area too,
  1235. and more established users can use them as relays so they don't need to
  1236. communicate over the firewall directly at all? A simple example here is
  1237. to make new blocked users into internal bridges also---so they sign up
  1238. on the bridge authority as part of doing their query, and we give out
  1239. their addresses
  1240. rather than (or along with) the external bridge addresses. This design
  1241. is a lot trickier because it brings in the complexity of whether the
  1242. internal bridges will remain available, can maintain reachability with
  1243. the outside world, etc.
  1244. Hidden services as bridges. Hidden services as bridge directory authorities.
  1245. \section{Conclusion}
  1246. a technical solution won't solve the whole problem. after all, china's
  1247. firewall is *socially* very successful, even if technologies exist to
  1248. get around it.
  1249. but having a strong technical solution is still useful as a piece of the
  1250. puzzle. and tor provides a great set of building blocks to start from.
  1251. \bibliographystyle{plain} \bibliography{tor-design}
  1252. %\appendix
  1253. %\section{Counting Tor users by country}
  1254. %\label{app:geoip}
  1255. \end{document}
  1256. ship geoip db to bridges. they look up users who tls to them in the db,
  1257. and upload a signed list of countries and number-of-users each day. the
  1258. bridge authority aggregates them and publishes stats.
  1259. bridge relays have buddies
  1260. they ask a user to test the reachability of their buddy.
  1261. leaks O(1) bridges, but not O(n).
  1262. we should not be blockable by ordinary cisco censorship features.
  1263. that is, if they want to block our new design, they will need to
  1264. add a feature to block exactly this.
  1265. strategically speaking, this may come in handy.
  1266. Bridges come in clumps of 4 or 8 or whatever. If you know one bridge
  1267. in a clump, the authority will tell you the rest. Now bridges can
  1268. ask users to test reachability of their buddies.
  1269. Giving out clumps helps with dynamic IP addresses too. Whether it
  1270. should be 4 or 8 depends on our churn.
  1271. the account server. let's call it a database, it doesn't have to
  1272. be a thing that human interacts with.
  1273. so how do we reward people for being good?
  1274. \subsubsection{Public Bridges with Coordinated Discovery}
  1275. ****Pretty much this whole subsubsection will probably need to be
  1276. deferred until ``later'' and moved to after end document, but I'm leaving
  1277. it here for now in case useful.******
  1278. Rather than be entirely centralized, we can have a coordinated
  1279. collection of bridge authorities, analogous to how Tor network
  1280. directory authorities now work.
  1281. Key components
  1282. ``Authorities'' will distribute caches of what they know to overlapping
  1283. collections of nodes so that no one node is owned by one authority.
  1284. Also so that it is impossible to DoS info maintained by one authority
  1285. simply by making requests to it.
  1286. Where a bridge gets assigned is not predictable by the bridge?
  1287. If authorities don't know the IP addresses of the bridges they
  1288. are responsible for, they can't abuse that info (or be attacked for
  1289. having it). But, they also can't, e.g., control being sent massive
  1290. lists of nodes that were never good. This raises another question.
  1291. We generally decry use of IP address for location, etc. but we
  1292. need to do that to limit the introduction of functional but useless
  1293. IP addresses because, e.g., they are in China and the adversary
  1294. owns massive chunks of the IP space there.
  1295. We don't want an arbitrary someone to be able to contact the
  1296. authorities and say an IP address is bad because it would be easy
  1297. for an adversary to take down all the suspicious bridges
  1298. even if they provide good cover websites, etc. Only the bridge
  1299. itself and/or the directory authority can declare a bridge blocked
  1300. from somewhere.
  1301. 9. Bridge directories must not simply be a handful of nodes that
  1302. provide the list of bridges. They must flood or otherwise distribute
  1303. information out to other Tor nodes as mirrors. That way it becomes
  1304. difficult for censors to flood the bridge directory servers with
  1305. requests, effectively denying access for others. But, there's lots of
  1306. churn and a much larger size than Tor directories. We are forced to
  1307. handle the directory scaling problem here much sooner than for the
  1308. network in general. Authorities can pass their bridge directories
  1309. (and policy info) to some moderate number of unidentified Tor nodes.
  1310. Anyone contacting one of those nodes can get bridge info. the nodes
  1311. must remain somewhat synched to prevent the adversary from abusing,
  1312. e.g., a timed release policy or the distribution to those nodes must
  1313. be resilient even if they are not coordinating.
  1314. I think some kind of DHT like scheme would work here. A Tor node is
  1315. assigned a chunk of the directory. Lookups in the directory should be
  1316. via hashes of keys (fingerprints) and that should determine the Tor
  1317. nodes responsible. Ordinary directories can publish lists of Tor nodes
  1318. responsible for fingerprint ranges. Clients looking to update info on
  1319. some bridge will make a Tor connection to one of the nodes responsible
  1320. for that address. Instead of shutting down a circuit after getting
  1321. info on one address, extend it to another that is responsible for that
  1322. address (the node from which you are extending knows you are doing so
  1323. anyway). Keep going. This way you can amortize the Tor connection.
  1324. 10. We need some way to give new identity keys out to those who need
  1325. them without letting those get immediately blocked by authorities. One
  1326. way is to give a fingerprint that gets you more fingerprints, as
  1327. already described. These are meted out/updated periodically but allow
  1328. us to keep track of which sources are compromised: if a distribution
  1329. fingerprint repeatedly leads to quickly blocked bridges, it should be
  1330. suspect, dropped, etc. Since we're using hashes, there shouldn't be a
  1331. correlation with bridge directory mirrors, bridges, portions of the
  1332. network observed, etc. It should just be that the authorities know
  1333. about that key that leads to new addresses.
  1334. This last point is very much like the issues in the valet nodes paper,
  1335. which is essentially about blocking resistance wrt exiting the Tor network,
  1336. while this paper is concerned with blocking the entering to the Tor network.
  1337. In fact the tickets used to connect to the IPo (Introduction Point),
  1338. could serve as an example, except that instead of authorizing
  1339. a connection to the Hidden Service, it's authorizing the downloading
  1340. of more fingerprints.
  1341. Also, the fingerprints can follow the hash(q + '1' + cookie) scheme of
  1342. that paper (where q = hash(PK + salt) gave the q.onion address). This
  1343. allows us to control and track which fingerprint was causing problems.
  1344. Note that, unlike many settings, the reputation problem should not be
  1345. hard here. If a bridge says it is blocked, then it might as well be.
  1346. If an adversary can say that the bridge is blocked wrt
  1347. $\mathit{censor}_i$, then it might as well be, since
  1348. $\mathit{censor}_i$ can presumably then block that bridge if it so
  1349. chooses.
  1350. 11. How much damage can the adversary do by running nodes in the Tor
  1351. network and watching for bridge nodes connecting to it? (This is
  1352. analogous to an Introduction Point watching for Valet Nodes connecting
  1353. to it.) What percentage of the network do you need to own to do how
  1354. much damage. Here the entry-guard design comes in helpfully. So we
  1355. need to have bridges use entry-guards, but (cf. 3 above) not use
  1356. bridges as entry-guards. Here's a serious tradeoff (again akin to the
  1357. ratio of valets to IPos) the more bridges/client the worse the
  1358. anonymity of that client. The fewer bridges/client the worse the
  1359. blocking resistance of that client.