TorBricks: Blocking-Resistant Tor Bridge Distribution
نویسندگان
چکیده
Tor is currently the most popular network for anonymous Internet access. It critically relies on volunteer nodes called bridges for relaying Internet traffic when a user’s ISP blocks connections to Tor. Unfortunately, current methods for distributing bridges are vulnerable to malicious users who obtain and block bridge addresses. In this paper, we propose TorBricks, a protocol for distributing Tor bridges to n users, even when an unknown number t < n of these users are controlled by a malicious adversary. TorBricks distributes O(t logn) bridges and guarantees that all honest users can connect to Tor with high probability after O(log t) rounds of communication with the distributor. We also extend our algorithm to perform privacy-preserving bridge distribution when run among multiple untrusted distributors. This not only prevents the distributors from learning bridge addresses and bridge assignment information, but also provides resistance against malicious attacks from a bm/3c fraction of the distributors, where m is the number of distributors.
منابع مشابه
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
Tor is one of the most popular censorship circumven-tion systems; it uses bridges run by volunteers as proxies toevade censorship. A key challenge to the Tor circumventionsystem is to distribute bridges to a large number of userswhile avoiding having the bridges fall into the hands ofcorrupt users. We propose rBridge—a user reputation sys-tem for bridge distribution; it ...
متن کاملSPATor: Improving Tor Bridges with Single Packet Authorization
Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a local adversary to determine with whom a particular Tor user is communicating. In response, some local adversaries restrict access to Tor by blo...
متن کاملDesign of a blocking-resistant anonymity system
Internet censorship is on the rise as websites around the world are increasingly blocked by government-level firewalls. Although popular anonymizing networks like Tor were originally designed to keep attackers from tracing people’s activities, many people are also using them to evade local censorship. But if the censor simply denies access to the Tor network itself, blocked users can no longer ...
متن کاملTor and Circumvention: Lessons Learned - (Abstract to Go with Invited Talk)
Tor is a free-software anonymizing overlay network that helps people around the world use the Internet in safety. Tor’s 2500 volunteer relays carry almost 10Gb/s of traffic for several hundred thousand users each day. While many in the research community know Tor as the primary fielded system in the anonymous communications literature [2], Tor has also played a central role in recent research o...
متن کاملDissecting Tor Bridges: A Security Evaluation of their Private and Public Infrastructures
Bridges are onion routers in the Tor Network whose IP addresses are not public. So far, no global security analysis of Tor bridges has been performed. Leveraging public data sources, and two known Tor issues, we perform the first systematic study on the security of the Tor bridges infrastructure. Our study covers both the public infrastructure available to all Tor users, and the previously unre...
متن کامل