-
I was reading https://github.com/Tribler/tribler/wiki/Anonymous-Downloading-and-Streaming-specifications ... isn't it the case that the hop1 can fake all next hops? It could generate any keypairs of next hops and become a tunnel aware of all communication for that circuit. And noone would notice. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Absolutely! However, there is only one situation in which the attacker can do anything with this information. There are a lot of nuances going on here (regarding cryptography and statistics) and I'll try to keep it short (I hope someone corrects me if I omit important info). The promises of "naked" Tribler anonymous downloadingBefore I jump into what we are trying to achieve. Let me discuss what Tribler does when it connects its circuits to the Internet. Tribler should strip out personally identifiable information from all torrent traffic when anonymously downloading. Simply observing exit traffic should not lead to being able to identify the traffic's source. There should never be any hard evidence that any particular user downloaded any particular torrent. The circuit extension should not expose the length of a circuit. When you send data over a circuit any following node should only see a fixed-size packet that does not expose the length of the circuit. Therefore, any node (fake or real) should not be able to distinguish which hop it is in the circuit. This means that an attacker does not know wether it is forwarding data to yet another relay or to the origin of the circuit. Tribler should randomly pick people in the network to create (and extend) circuits with. This comes down to strength in numbers. If an attacker has a very small presence in a network, it will be very unlikely that they can attack any particular user. Tribler should rotate circuits based on time and their use. Even if some horrible security blunder occurs, every 60 seconds unused circuits are dropped and each circuit is only used up to 250MB or up to 10 minutes. Considering most torrents are used for large files, this usually only exposes a small part of a download. [If Tribler ever breaks any of these promises, it would constitute a security vulnerability.] The one attack that will work with "naked" downloadingSuppose an attacker controls every following hop in a circuit. There is still no way for it to know whether the preceding hop is the originating node, unless the attacker knows how long a circuit is going to be beforehand. An attacker may be asked to create a circuit with x hops (for which it may use fake identities) and it may know the origin is trying to create a circuit of x hops. In this case, the attacker knows it controls all hops and that the preceding node is the originating node. Of course, Tribler still rotates circuits for you. This should keep the damage at least to a minimum. What we are trying achieveThis attack keeps us up at night and has been leading our lab for years. This is captured in issue #1 and issue #3. To give some quick insight into what we're trying to do to resolve this:
|
Beta Was this translation helpful? Give feedback.
-
I guess I was deluded by "tor-like network", or how I imagined tor to be. |
Beta Was this translation helpful? Give feedback.
Absolutely! However, there is only one situation in which the attacker can do anything with this information. There are a lot of nuances going on here (regarding cryptography and statistics) and I'll try to keep it short (I hope someone corrects me if I omit important info).
The promises of "naked" Tribler anonymous downloading
Before I jump into what we are trying to achieve. Let me discuss what Tribler does when it connects its circuits to the Internet.
Tribler should strip out personally identifiable information from all torrent traffic when anonymously downloading. Simply observing exit traffic should not lead to being able to identify the traffic's source. There should never be any h…