Monday, October 16, 2017

List of TOR Relays for Optimal Correlation Attack

Following our study whose preliminary results have been published here, we have obtained additional results as far as correlation attack and partial anonymity removing are concerned. People who have made feedbacks on our study were interested in the consequences of possible attacks that could be performed on the TOR network. 

We will not give data on relay bridges but as far as simple ORs are concerned, here is the list of the most sensitive ORs (preeminent weight in the three-OR circuits) that could be targeted to
  • correlate aproximatively 40 % of the traffic
  • remove anonymity of approximatively 9 % of the traffic
These ORs should have a boosted/strengthened security.

By the way, we give here the Maltego graph of the authorities with respect to the version evolution. Detailed explanation is contained in a paper recently submitted in an international conference.

Monday, September 4, 2017

Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis

Preliminary Results on TOR Routing Protocol Statistical and Combinatorial Analysis

In the present document, we share the preliminary results of a 4-month study about the TOR routing protocol from a statistical and combinatorial point of view. For the moment we only give the final data not the algorithms and technical/mathematical approaches (to be fair with conferences where we will present them first).

We have modeled exhaustively all possible routes while taking di fferent parameters into account with the data provided by the TOR foundation only. We have then confronted our theoretical model with the reality on the ground. To do this, we generated thousands of roads on the TOR network and compared the results obtained with those predicted by the theory. A last step of combinatorial analysis has enabled us to identify critical subsets of Onion routers (ORs). We have also managed to extract most of the relay bridges and give an initial list of nearly 2500 relays bridges.

Important notice: we do not claim to have broken TOR in any way. These results are just  preliminary results data that will be presented in two parts, each in an international security event. Right after those events, this paper will be extended to provide most of technical details, algorithms, protocols we have set up and used. From those results anyone can figure out the interest, the impact and consequences of them.