Blocking in Tor with Trusted Computing ( Short Paper : Work in Progress ) ∗
نویسندگان
چکیده
How does one block an anonymous user hiding behind an anonymous routing network? In this paper, we outline a security protocol that uses resourceconstrained trusted hardware to facilitate anonymous IP-address blocking in anonymizing networks such as Tor. Tor allows users to access Internet services privately by using a series of Tor routers to obfuscate the route from the client to the server, thereby hiding the client’s IP address from the server. The success of Tor, however, has been limited because of malicious users who misuse the network. For example, anonymous users can deface websites or create malicious entries on websites such as Wikipedia. Administrators of these websites routinely rely on IP-address blocking for disabling misbehaving users’ accesses. The IP-address anonymity provided by Tor, however, makes it difficult for administrators to deny access to such offenders. As a result, administrators resort to blocking all Tor exit nodes, effectively denying anonymous access for all Tor’s users. Our solution makes use of trusted hardware and allows services like Tor to provide anonymous blocking of IP addresses while requiring only a modest amount of storage at the trusted node. ∗This research was supported in part by the NSF, under grant CNS-0524695, and the Bureau of Justice Assistance, under grant 2005-DD-BX-1091. The views and conclusions do not necessarily reflect the views of the sponsors. 1Wikipedia. http://www.wikipedia.com
منابع مشابه
How China Is Blocking Tor
Abstract. Not only the free web is victim to China’s excessive censorship, but also the Tor anonymity network: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose countermeasures. Our work bolsters...
متن کاملHow the Great Firewall of China is Blocking Tor
Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose circumvention techniques. Our work bolsters the understanding of China’s censorship ...
متن کاملEnhancing Security and Privacy of Tor's Ecosystem by Using Trusted Execution Environments
With Tor being a popular anonymity network, many attacks have been proposed to break its anonymity or leak information of a private communication on Tor. However, guaranteeing complete privacy in the face of an adversary on Tor is especially difficult because Tor relays are under complete control of world-wide volunteers. Currently, one can gain private information, such as circuit identifiers ...
متن کاملTracing Misbehaving Users by Utilizing Ticket-Based Protocols by Trusted Third Party in Anonymizing Networks
–Anonymizing networks provides network services to users without specific identity. Network administrator cannot identify user actions in anonymizing networks. Anonymizing networks such as The Onion Routing Networks (TOR) uses a layer structured encrypted message and series of routers each with a key to decrypt and forward the message. Which hide’s the client’s IP address from the server. The l...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کامل