On the Challenges of Geographical Avoidance for Tor

Katharina Kohls, Kai Jansen, David Rupprecht, Thorsten Holz, Christina Poepper

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Traffic-analysis attacks are a persisting threat for Tor users. When censors or law enforcement agencies try to identify users, they conduct traffic-confirmation attacks and monitor encrypted transmissions to extract metadata—in combination with routing attacks, these attacks become sufficiently powerful to de-anonymize users. While traffic-analysis attacks are hard to detect and expensive to counter in practice, geographical avoidance provides an option to reject circuits that might be routed through an untrusted area. Unfortunately, recently proposed solutions introduce severe security issues by imprudent design decisions.

In this paper, we approach geographical avoidance starting from a thorough assessment of its challenges. These challenges serve as the foundation for the design of an empirical avoidance concept that considers actual transmission characteristics for justified decisions. Furthermore, we address the problems of untrusted or intransparent ground truth information that hinder a reliable assessment of circuits. Taking these features into account, we conduct an empirical simulation study and compare the performance of our novel avoidance concept with existing approaches. Our results show that we outperform existing systems by 22% fewer rejected circuits, which reduces the collateral damage of overly restrictive avoidance decisions. In a second evaluation step, we extend our initial system concept and implement the prototype TrilateraTor. This prototype is the first to satisfy the requirements of a practical deployment, as it maintains Tor’s original level of security, provides reasonable performance, and overcomes the fundamental security flaws of existing systems.
Original languageEnglish (US)
Title of host publicationProceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS)
PublisherThe Internet Society
Number of pages15
Edition26
ISBN (Electronic)1-891562-55-X
StatePublished - Feb 24 2019

Fingerprint

Dive into the research topics of 'On the Challenges of Geographical Avoidance for Tor'. Together they form a unique fingerprint.

Cite this