The Effect of DNS on Tor's Anonymity

نویسندگان

  • Benjamin Greschbach
  • Tobias Pulls
  • Laura M. Roberts
  • Phillip Winter
  • Nick Feamster
چکیده

Previous attacks that link the sender and receiver of traffic in the Tor network (“correlation attacks”) have generally relied on analyzing traffic from TCP connections. The TCP connections of a typical client application, however, are often accompanied by DNS requests and responses. This additional traffic presents more opportunities for correlation attacks. This paper quantifies how DNS traffic can make Tor users more vulnerable to correlation attacks. We investigate how incorporating DNS traffic can make existing correlation attacks more powerful and how DNS lookups can leak information to third parties about anonymous communication. We (i) develop a method to identify the DNS resolvers of Tor exit relays; (ii) develop a new set of correlation attacks (DefecTor attacks) that incorporate DNS traffic to improve precision; (iii) analyze the Internet-scale effects of these new attacks on Tor users; and (iv) develop improved methods to evaluate correlation attacks. First, we find that there exist adversaries who can mount DefecTor attacks: for example, Google’s DNS resolver observes almost 40% of all DNS requests exiting the Tor network. We also find that DNS requests often traverse ASes that the corresponding TCP connections do not transit, enabling additional ASes to gain information about Tor users’ traffic. We then show that an adversary who can mount a DefecTor attack can often determine the website that a Tor user is visiting with perfect precision, particularly for less popular websites where the set of DNS names associated with that website may be unique to the site. We also use the Tor Path Simulator (TorPS) in combination with traceroute data from vantage points co-located with Tor exit relays to estimate the power of AS-level adversaries who might mount DefecTor attacks in practice.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Dynamic Neuromuscular Stabilization Breathing Exercises on Some Spirometry Indices of Sedentary Students With Poor Posture

Purpose: Dynamic Neuromuscular Stabilization (DNS) approach is developed based on neurodevelopmental kinesiology and reflex-mediated core stabilization concepts. But the outcomes of this approach remain unclear. So changes in some spirometry indices in response to DNS breathing exercises in sedentary students with poor posture will be explored. Methods: In this single-group pretest-posttest st...

متن کامل

Effect of Central Stability and Dynamic Neuromuscular Stabilization Exercises on Pain, Flexibility, Balance, Muscle Endurance and Quality of Life in Men With Nonspecific Chronic Low Back Pain

Background: Study on the effectiveness of new methods of low back pain treatment is very important due to its high prevalence. There is no consensus on the most effective treatment for low back pain, despite the existence of different treatments options. Objective: This study aims to assess the effect of 8 weeks of dynamic neuromuscular stabilization (DNS) and core stability (CS) exercises on ...

متن کامل

Enhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments

With Tor being a popular anonymity network, many attacks have been proposed to break its anonymity or leak information of a private communication on Tor. However, guaranteeing complete privacy in the face of an adversary on Tor is especially difficult because Tor relays are under complete control of world-wide volunteers. Currently, one can gain private information, such as circuit identifiers ...

متن کامل

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking privacy and anonymity. They have been applied to a wide range of use cases, with commercial providers often making bold claims regarding their ability to fulfil each of these needs, e.g., censorship circumvention, anonymity and protection from monitoring and tracking. However, as ...

متن کامل

The Effect of DNS on Tor’s Anonymity† (abstract)

We have yet to learn how to build anonymity networks that resist global adversaries, provide low latency, and scale well. Remailer systems such as Mixmaster [6] and Mixminion [1] eschew low latency in favor of strong anonymity. In contrast, Tor [2] trades off strong anonymity to achieve low latency; Tor therefore enables latencysensitive applications such as web browsing but is vulnerable to ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1609.08187  شماره 

صفحات  -

تاریخ انتشار 2017