Yesterday, Tor issued a security advisory which revealed that a group of relays had been discovered on July 4th which looked like they "were trying to deanonymize users."

The advisory states that the attack "involved modifying Tor protocol headers to do traffic confirmation attacks" with the relays having joined the network at the start of the year. This means they were potentially deanonymizing users between January 30th and July 4th when they were finally removed.

A Tor spokesperson says that they know the attack "looked for users who fetched hidden service descriptors, but the attackers likely were not able to see any application-level traffic" so no details of pages visited or whether hidden services searched for were actually visited at all for that matter. The advisory goes on to warn that it is likely that the attackers tried to learn "who published hidden service descriptors, which would allow the attackers to learn the location of that hidden service."

No evidence was found to suggest that any exit relays were being operated, so the probability of linking users to destinations on standard Tor circuits remains remote. For full technical details of the attack methodology, see the advisory which goes into this at some length.

The following steps have been taken to remediate the damage in the short term:

  • Attacking relays removed from the Tor network
  • A software update has gone out for relays in order to prevent such use of 'relay early' cells again
  • A new Tor version warns in the logs if a relay on your path injects any relay-early cells

Meanwhile, Amichai Shulman who is the CTO at security experts Imperva says "sadly the ideal of having a distributed, crowd based network for protecting free speech is largely abused by pirates (software and content) as well as evil-doers – from child pornography to drug trafficking and terrorism. This in turn makes the TOR network a target for all intelligence agencies as well as some domestic security organizations. I suspect the reported attack, targeted mostly at people who operate and access TOR hidden service, is of that origin."

Craig Young, a security researcher at Tripwire, takes a slightly different view saying "While the attacker(s) in this case are still technically anonymous, it would appear that there is most likely a connection between this incident and the recently withdrawn Black Hat presentation on deanonymizing TOR users. If this was in fact a university research project, it was conducted without appropriate regard to users of the TOR network. This attack involved manipulating TOR protocol messages to encode information about observed requests so that the information could be correlated with an identity by relays in other parts of the network. In doing so the attackers not only made it possible to themselves unmask some TOR hidden services and users but they have also created an unquantifiable risk as these messages could also be decoded by other parties either while the attack was in progress or in retrospect by analyzing stored packet captures."

As Editorial Director and Managing Analyst with IT Security Thing I am putting more than two decades of consulting experience into providing opinionated insight regarding the security threat landscape for IT security professionals. As an Editorial Fellow with Dennis Publishing, I bring more than two decades of writing experience across the technology industry into publications such as Alphr, IT Pro and (in good old fashioned print) PC Pro. I also write for SC Magazine UK and Infosecurity, as well as The Times and Sunday Times newspapers. Along the way I have been honoured with a Technology Journalist of the Year award, and three Information Security Journalist of the Year awards. Most humbling, though, was the Enigma Award for 'lifetime contribution to IT security journalism' bestowed on me in 2011.

3 Years
Discussion Span
Last Post by Slavi

Jaime Blasco, director of AlienVault Labs, has added his thoughts:

“TOR provides anonymity, if you want to have privacy you still have to use something like a VPN in order to connect to the TOR network. You are still facing other problems like tracking and profiling or unauthorized access to your system using exploitation of the browser or any other software you are using over the TOR network. As an example the FBI used an exploit affecting Firefox to deanonymize TOR users accessing illegal content. On the other hand, governments are actively investing a huge amount of money and resources in order to compromise the TOR network. If you want to be secure you should assume TOR is compromised and use other methods to maintain your anonymity and privacy within TOR.”

Edited by happygeek

Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.