Title :
Locating hidden servers
Author :
Overlier, Lasse ; Syverson, Paul
Author_Institution :
Norwegian Defence Res. Establ.
Abstract :
Hidden services were deployed on the Tor anonymous communication network in 2004. Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship. We present fast and cheap attacks that reveal the location of a hidden server. Using a single hostile Tor node we have located deployed hidden servers in a matter of minutes. Although we examine hidden services over Tor, our results apply to any client using a variety of anonymity networks. In fact, these are the first actual intersection attacks on any deployed public network: thus confirming general expectations from prior theory and simulation. We recommend changes to route selection design and implementation for Tor. These changes require no operational increase in network overhead and are simple to make; but they prevent the attacks we have demonstrated. They have been implemented
Keywords :
computer networks; telecommunication security; Tor anonymous communication network; anonymity networks; censorship resistance; distributed DoS server resistance; hidden servers; intersection attacks; network overhead; single hostile Tor node; Communication networks; Computer crime; Educational institutions; Laboratories; Law; Network servers; Protection; Resists; Safety; Writing;
Conference_Titel :
Security and Privacy, 2006 IEEE Symposium on
Conference_Location :
Berkeley/Oakland, CA
Print_ISBN :
0-7695-2574-1