Attacking and Improving the Tor Directory Protocol

被引:0
|
作者
Luo, Zhongtang [1 ]
Bhat, Adithya [1 ]
Nayak, Kartik [2 ]
Kate, Aniket [3 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] Duke Univ, Durham, NC USA
[3] Purdue Univ, Supra Res, W Lafayette, IN 47907 USA
来源
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024 | 2024年
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP54263.2024.00083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Tor network enhances clients' privacy by routing traffic through an overlay network of volunteered intermediate relays. Tor employs a distributed protocol among nine hard-coded Directory Authority (DA) servers to securely disseminate information about these relays to produce a new consensus document every hour. With a straightforward voting mechanism to ensure consistency, the protocol is expected to be secure even when a minority of those authorities get compromised. However, the current consensus protocol is flawed: it allows an equivocation attack that enables only a single compromised authority to create a valid consensus document with malicious relays. Importantly the vulnerability is not innocuous: We demonstrate that the compromised authority can effectively trick a targeted client into using the equivocated consensus document in an undetectable manner. Moreover, even if we have archived Tor consensus documents available since its beginning, we cannot be sure that no client was ever tricked. We propose a two-stage solution to deal with this exploit. In the short term, we have developed and deployed TorEq, a monitor to detect such exploits reactively: the Tor clients can refer to the monitor before updating the consensus to ensure no equivocation. To solve the problem proactively, we first define the Tor DA consensus problem as the interactive consistency (IC) problem from the distributed computing literature. We then design DirCast, a novel secure Byzantine Broadcast protocol that requires minimal code change from the current Tor DA code base. Our protocol has near-optimal efficiency that uses optimistically five rounds and at most nine rounds to reach an agreement in the current nine-authority system. Our solutions are practical: our performance analysis shows that our monitor can detect equivocations without changing the authorities' code in five minutes; the secure IC protocol can generate up to 500 consensus documents per hour in a real-world scenario. We are communicating with the Tor security team to incorporate the solutions into the Tor project.
引用
收藏
页码:3221 / 3237
页数:17
相关论文
共 50 条
  • [21] Protocol-level attacks against Tor
    Ling, Zhen
    Luo, Junzhou
    Yu, Wei
    Fu, Xinwen
    Jia, Weijia
    Zhao, Wei
    COMPUTER NETWORKS, 2013, 57 (04) : 869 - 886
  • [22] Statistical and Combinatorial Analysis of the TOR Routing Protocol Structural Weaknesses Identified in the TOR Network
    Filiol, Eric
    Nicolas, J.
    Delong, Maxence
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 507 - 516
  • [23] SmarTor: Smarter Tor with Smart Contracts Improving resilience of topology distribution in the Tor network
    Andre, Greubel
    Alexandra, Dmitrienko
    Samuel, Kounev
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 677 - 691
  • [24] Attacking IEC 61850 Substations by Targeting the PTP Protocol
    Akbarzadeh, Aida
    Erdodi, Laszlo
    Houmb, Siv Hilde
    Soltvedt, Tore Geir
    Muggerud, Hans Kristian
    ELECTRONICS, 2023, 12 (12)
  • [25] A formal analysis of the Lightweight Directory Access Protocol
    Wei, F
    Lausen, G
    CONCEPTUAL MODELING FOR NEW INFORMATION SYSTEMS TECHNOLOGIES, 2002, 2465 : 306 - 319
  • [26] Improving Tor Hidden Service Crawler Performance
    Park, Jonghyeon
    Mun, Hyunsu
    Lee, Youngseok
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 362 - 369
  • [27] A Synchronization-Based Alternative to Directory Protocol
    Huang, He
    Liu, Lei
    Yuan, Nan
    Lin, Wei
    Song, Fenglong
    Zhang, Junchao
    Fan, Dongrui
    2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 175 - 181
  • [28] Improving connection management of the OpenLDAP directory server
    Lim, SS
    Choi, JH
    Franke, H
    Zeilenga, KD
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2006, : 225 - +
  • [29] Directory of clinical databases: improving and promoting their use
    Black, N
    Payne, M
    QUALITY & SAFETY IN HEALTH CARE, 2003, 12 (05): : 348 - 352
  • [30] A Mapping Study on The Behavirol Analysis of Tor Relay Protocol
    Ince, Ayse Bilge
    Aktas, Mehmet S.
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 288 - 293