Is the popular Tor network broken? In the recent months, after the Showden’s revelations, many security experts have started to investigate on the possibility that the US intelligence, and not only, has found a way to compromise the Tor network. Last week I published a blog post that commented a report issued by the German broadcaster ARD in which is confirmed that the NSA XKeyscore was used to target two Germany-based Tor Directory Authority servers.
In the recent months it was also discussed about the possibility to track selected users on Tor networks with a technique known as Trafﬁc Correlation Attack defined by the researchers led by Aaron Johnson of the Naval Research Laboratory.
Today I want to anticipate you that two hackers have announced to be able to de-anonymize Tor users easy, the two experts Alexander Volynkin and Michael McCord will present the results of their study at the next Black Hat 2014.
In the presentation they have announced, titled “YOU DON’T HAVE TO BE THE NSA TO BREAK TOR: DEANONYMIZING USERS ON A BUDGET“, the experts will show how to identify Tor users with a very small budget, just $3,000.
“There is nothing that prevents you from using your resources to de-anonymize the network’s users instead by exploiting fundamental flaws in Tor design and implementation. And you don’t need the NSA budget to do so. Looking for the IP address of a Tor user? Not a problem. Trying to uncover the location of a Hidden Service? Done. We know because we tested it, in the wild…” “In this talk, we demonstrate how the distributed nature, combined with newly discovered shortcomings in design and implementation of the Tor network, can be abused to break Tor anonymity,” are the statements used by the two researchers to describe their work.
I confess you to be very excited to see the presentation of the two experts, as they had anticipated, with a limited budget, it is possible to track users on Tor network, so let’s imagine the capabilities of a persistent attacker with much more computational capability and with a “couple gigabit links”. According to the two experts a persistent adversary “with a handful of powerful servers and a couple gigabit links can de-anonymize hundreds of thousands Tor clients and thousands of hidden services within a couple of months.”
Many readers will be very happy to read about the this discovery, in fact, Tor network is used by many criminals for illicit activities, like botnet control, sale of drugs and weapons, and distribution of porn material.
But Tor network is a precious tool to avoid censorship and the discovery of the two researchers could be abused, and probably is already happening, to persecute Tor users that adopt the anonymizing network to avoid control and the Internet monitoring.
I personally hope that the researchers will carefully disclose the results of their study, notifying to Tor’s developers how to fix potential flaw in the Tor network design.
Stay tuned … if the discovery is confirmed, millions of Tor network users are at risk.
(Security Affairs – Tor Network, hacking)