Attacking and Improving the Tor Directory Protocol

被引:0
|
作者
Luo, Zhongtang [1 ]
Bhat, Adithya [1 ]
Nayak, Kartik [2 ]
Kate, Aniket [3 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Duke Univ, Durham, NC USA
[3] Purdue Univ, Supra Res, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP54263.2024.00083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Tor network enhances clients' privacy by routing traffic through an overlay network of volunteered intermediate relays. Tor employs a distributed protocol among nine hard-coded Directory Authority (DA) servers to securely disseminate information about these relays to produce a new consensus document every hour. With a straightforward voting mechanism to ensure consistency, the protocol is expected to be secure even when a minority of those authorities get compromised. However, the current consensus protocol is flawed: it allows an equivocation attack that enables only a single compromised authority to create a valid consensus document with malicious relays. Importantly the vulnerability is not innocuous: We demonstrate that the compromised authority can effectively trick a targeted client into using the equivocated consensus document in an undetectable manner. Moreover, even if we have archived Tor consensus documents available since its beginning, we cannot be sure that no client was ever tricked. We propose a two-stage solution to deal with this exploit. In the short term, we have developed and deployed TorEq, a monitor to detect such exploits reactively: the Tor clients can refer to the monitor before updating the consensus to ensure no equivocation. To solve the problem proactively, we first define the Tor DA consensus problem as the interactive consistency (IC) problem from the distributed computing literature. We then design DirCast, a novel secure Byzantine Broadcast protocol that requires minimal code change from the current Tor DA code base. Our protocol has near-optimal efficiency that uses optimistically five rounds and at most nine rounds to reach an agreement in the current nine-authority system. Our solutions are practical: our performance analysis shows that our monitor can detect equivocations without changing the authorities' code in five minutes; the secure IC protocol can generate up to 500 consensus documents per hour in a real-world scenario. We are communicating with the Tor security team to incorporate the solutions into the Tor project.
引用
收藏
页码:3221 / 3237
页数:17
相关论文
共 50 条
  • [1] On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
    Diaz Motero, Carlos
    Bermejo Higuera, Juan Ramon
    Bermejo Higuera, Javier
    Sicilia Montalvo, Juan Antonio
    Gamez Gomez, Nadia
    IEEE ACCESS, 2021, 9 : 109289 - 109319
  • [2] Attacking Tor through Unpopular Ports
    Sulaiman, Muhammad Aliyu
    Zhioua, Sami
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 33 - 38
  • [3] Attacking the Network Time Protocol
    Malhotra, Aanchal
    Cohen, Isaac E.
    Brakke, Erik
    Goldberg, Sharon
    23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,
  • [4] On the security of the Tor authentication protocol
    Goldberg, Ian
    Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
  • [5] Beyond TOR: The TrueNyms Protocol
    Bernard, Nicolas
    Leprevost, Franck
    SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 68 - 84
  • [6] The arrow distributed directory protocol
    Demmer, MJ
    Herlihy, MP
    DISTRIBUTED COMPUTING, 1998, 1499 : 119 - 133
  • [7] The Arvy Distributed Directory Protocol
    Khanchandani, Pankaj
    Wattenhofer, Roger
    SPAA'19: PROCEEDINGS OF THE 31ST ACM SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURESS, 2019, 2019, : 225 - 235
  • [8] Attacking and Repairing the Improved ModOnions Protocol
    Borisov, Nikita
    Klonowski, Marek
    Kutylowski, Miroslaw
    Lauks-Dutka, Anna
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 258 - +
  • [9] Deriving, attacking and defending the GDOI protocol
    Meadows, C
    Pavlovic, D
    COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 53 - 72
  • [10] Effective Attacks in the Tor Authentication Protocol
    Zhang, Yang
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 81 - 86