Towards Flexible Anonymous Networks

03/07/2022
by   Florentin Rochet, et al.
0

Anonymous Communication designs such as Tor build their security upon distributing the trust in many volunteers running relays in many locations globally. These volunteers run the Tor code upon various operating systems, each potentially having different software packaging policies. In practice, it leads to a heterogeneous network in which many versions of the same Tor software exist, with a different set of protocol features. Because of the heterogeneous aspect of the network, the maintainers had to come up with forward-compatible protocol design strategies. Their role is to guarantee that different versions of the Tor software interact without unrecoverable errors. In this work, we cast the protocol tolerance enabled with forward-compatible protocol considerations as a double-edged sword. Despite being beneficial for the developers, we argue that protocol tolerance is the systemic cause behind many strong attacks against Tor in the past fifteen years. To address this issue, we propose FAN for Flexible Anonymous Network, a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without losing the ability for the developers to ensure the continuous evolution of their software. We realize an implementation, evaluate the overheads and, experiment with several of FAN's benefits to defend against a severe attack still applicable to Tor today.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/27/2019

Flexible Anonymous Network

Internet technologies have been designed from guidelines like the robust...
research
02/20/2019

Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning

TLS protocol is an essential part of secure Internet communication. In p...
research
08/07/2021

Machine Learning Assisted Security Analysis of 5G-Network-Connected Systems

The core network architecture of telecommunication systems has undergone...
research
08/26/2019

A universally verifiable voting protocol with complete cast-as-intended and counted-as-cast guarantees

We present a universally verifiable voting protocol and establish its co...
research
05/25/2022

The security of the Coordicide: the implementation and analysis of possible attack vectors

The goal of the thesis is to study and perform an analysis of the possib...
research
02/10/2020

On the Relationship between Software Complexity and Security

This work aims at discussing the complexity aspect of software while dem...

Please sign up or login with your details

Forgot password? Click here to reset