Towards Flexible Anonymous Networks

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

48 Downloads (Pure)

Abstract

Anonymous Communication designs such as Tor build their security on distributed trust over many volunteers running relays in diverse global locations. In practice, this distribution leads to a heterogeneous network in which many versions of the Tor software co-exist, each with differing sets of protocol features. Because of this heterogeneity, Tor developers employ forward-compatible protocol design as a strategy to maintain network extensibility. This strategy aims to guarantee that different versions of the Tor software interact without unrecoverable errors. In this work, we cast protocol tolerance that is enabled by forward-compatible protocol considerations as a fundamental security issue. We argue that, while being beneficial for the developers, protocol tolerance has resulted in a number of strong attacks against Tor in the past fifteen years.

To address this issue, we propose Flexible Anonymous Network (FAN), a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without losing the ability for developers to ensure the continuous evolution of their software. We i) instantiate an implementation, ii) evaluate its overheads and, iii) experiment with several of FAN’s benefits to defend against a severe attack still applicable to Tor today.
Original languageEnglish
Title of host publicationWPES 2024 - Proceedings of the 23rd Workshop on Privacy in the Electronic Society
Place of PublicationSalt Lake City, UT, USA
PublisherACM Press
Pages1-16
Number of pages16
ISBN (Electronic)9798400712395
DOIs
Publication statusPublished - 21 Nov 2024

Publication series

NameWPES 2024 - Proceedings of the 23rd Workshop on Privacy in the Electronic Society

Keywords

  • Tor
  • Anonymous Communications
  • Software Design
  • software design
  • tor
  • anonymous communications

Fingerprint

Dive into the research topics of 'Towards Flexible Anonymous Networks'. Together they form a unique fingerprint.

Cite this