privacy: Stream isolation for Tor #5911

pull laanwj wants to merge 2 commits into bitcoin:master from laanwj:2015_03_tor_circuit_randomization changing 9 files +436 −79
  1. laanwj commented at 3:53 pm on March 16, 2015: member

    According to Tor’s extensions to the SOCKS protocol (https://gitweb.torproject.org/torspec.git/tree/socks-extensions.txt) it is possible to perform stream isolation by providing authentication to the proxy. Each set of credentials will create a new circuit, which makes it harder to correlate connections.

    This patch adds an option, -proxyrandomize (on by default) that randomizes credentials for every outgoing connection, thus creating a new circuit for every peer connection.

    02015-03-16 15:29:59 SOCKS5 Sending proxy authentication 3842137544:3256031132
    

    Aside: we really need tests for the proxy functionality (as mentioned in other proxy-related pulls #5298, #4871, #4587), and I plan on adding a few, but I’ve put this up so it can already get some review and manual testing.

  2. laanwj added the label P2P on Mar 16, 2015
  3. laanwj force-pushed on Mar 16, 2015
  4. laanwj added this to the milestone 0.11.0 on Mar 16, 2015
  5. laanwj commented at 7:42 am on March 19, 2015: member

    This change has another advantage: every connection will (potentially) go through a different exit node. That significantly reduces the chance to get unlucky and pick a single exit node that is either malicious with regard to bitcoin, or widely banned on the P2P network.

    You can test this by looking at via in the peers list or addrlocal in getpeerinfo. This is the address that peers report that you connect from.

  6. jgarzik commented at 9:13 am on March 19, 2015: contributor
    Vaguely in favor – needs a lot of thinking-through. Consult with some Tor experts for their opinion?
  7. laanwj commented at 9:56 am on March 19, 2015: member

    needs a lot of thinking-through

    Can you explain what problem you see with this?

  8. jgarzik commented at 10:09 am on March 19, 2015: contributor
    @laanwj Nothing specific - just pattern matching. Sometimes stream cycling makes activities more visible rather than less, e.g. for the reasons that Tor bridges are used. This is the type of change that can have subtle ramifications not immediately obvious.
  9. laanwj commented at 10:20 am on March 19, 2015: member
    In that case it may be prudent to have it disabled by default, but I would like to have the option for this. Note that Tor already switches the circuit (for new connections) every 10 minutes by default, so this will mostly have an effect on the initial connections which are made in a short timespan. @gmaxwell was talking about defaulting this to enabled, maybe he can comment.
  10. gmaxwell commented at 1:44 pm on March 19, 2015: contributor

    I previously got an opinion from a tor developer that sounded vaguely like “you’re not doing that already??”– without it we potentially lose all our sybil resistant and a single bad-exit can partition us from the network, as we make all our connections at the same time, at startup.

    Hopping around the globe can make things more visible if you’re a web broswer and you’re hoping to not be noticed by the two people left in the world that don’t know how to RBL lookup tor exits, but I don’t think that applies in our case. We’re not futility hoping that the traffic exiting the tor network won’t be known to come from Tor.

    Also, without doing this there are non-trivial odds of having the users web traffic correlated with their node connections.

    We could do something more mild, like have each of our outbound connection indexes share a identifer with no loss… but I don’t currently see a reason to, I’ll ask for more of an opinion.

  11. laanwj commented at 9:29 am on April 1, 2015: member

    We could do something more mild, like have each of our outbound connection indexes share a identifer with no loss…

    This would have the effect of reusing the same circuit when reconnecting quickly. I can imagine that would happen when a node boots you immediately, or for some reason you’re cycling faster than every 10 minutes - if it takes longer a new circuit would be used automatically by Tor.

    When going through a list of questionable nodes, this may reduce the number of circuit building operations. I’m not sure that is an issue, at most a performance one. Potentially it could make it easier to correlate subsequent connections for an exit node.

  12. gmaxwell commented at 9:50 am on April 1, 2015: contributor
    @laanwj one downside that occurs to me is that an exit can make you ban that peer, then you’d continue using that same exit again and again. So at a minimum a misbehaving disconnect should change the identity for that slot.
  13. laanwj commented at 9:27 am on April 2, 2015: member

    Agreed. Bleh, I’d like to avoid that kind of complexity and ‘slot management’.

    In practice I’ve encountered no performance problems in using a different circuit every time. And even if it introduced some extra latency for new connections, we’re not terribly sensitive to that.

  14. laanwj commented at 1:31 pm on April 13, 2015: member

    I’d like to move this forward. Anything that still needs to be done here?

    If we are in doubt about enabling the randomization by default, I’d like to merge this with the option defaulting to false.

  15. gmaxwell commented at 4:15 pm on April 13, 2015: contributor
    This seems to work fine for me at least. I’m not concerned with more streams, it seems to make multiple connections a bit slower (for the obvious reasons), but also seems to make the connectivity more reliable (previously all the ipv4 peers would go down at once sometimes).
  16. privacy: Stream isolation for Tor
    According to Tor's extensions to the SOCKS protocol
    (https://gitweb.torproject.org/torspec.git/tree/socks-extensions.txt)
    it is possible to perform stream isolation by providing authentication
    to the proxy. Each set of credentials will create a new circuit,
    which makes it harder to correlate connections.
    
    This patch adds an option, `-proxyrandomize` (on by default) that randomizes
    credentials for every outgoing connection, thus creating a new circuit.
    
        2015-03-16 15:29:59 SOCKS5 Sending proxy authentication 3842137544:3256031132
    67a7949397
  17. laanwj force-pushed on Apr 17, 2015
  18. laanwj force-pushed on Apr 17, 2015
  19. laanwj commented at 5:29 pm on April 17, 2015: member
    Added a RPC test for the -proxy, -onion and -proxyrandomize functionality, as promised in OP.
  20. laanwj force-pushed on Apr 17, 2015
  21. rpc-tests: Add proxy test
    Add test for -proxy, -onion and -proxyrandomize.
    6be3562e50
  22. laanwj force-pushed on Apr 20, 2015
  23. laanwj merged this on Apr 20, 2015
  24. laanwj closed this on Apr 20, 2015

  25. laanwj referenced this in commit b6ea3bcede on Apr 20, 2015
  26. sipa commented at 3:16 pm on April 20, 2015: member
    What happens when you use this socks5 authentication with a non-Tor socks5 proxy?
  27. isislovecruft commented at 10:52 pm on May 6, 2015: none

    @sipa: What happens when you use this socks5 authentication with a non-Tor socks5 proxy?

    Overwhemingly likely: it won’t accept the username and password because there isn’t any user $RANDOM with password $RANDOM, and so it will reject the connection. (See RFC1929 §2 for what the byte values are in an auth rejection reply.)

    Rather unlikely: if the non-Tor SOCKS5 proxy behaves like Tor, in that it accepts any username/password pair, then you’ll authenticate to it and it’ll do… something, maybe, depending on what type of proxy it is. Off the top of my head, the only SOCKS5 proxies I can think of (other than Tor) which accept random username/password pairs, are Tor Pluggable Transports, which use the SOCKS5 username/password fields as a hack to pass keyword-value pairs from the outgoing client-side Tor process to the incoming client-side Pluggable Transport process (see §2.1.0.3 of pt-spec.txt).

  28. isislovecruft commented at 11:04 pm on May 6, 2015: none

    @gmaxwell: We could do something more mild, like have each of our outbound connection indexes share a identifer with no loss…

    @laanwj: This would have the effect of reusing the same circuit when reconnecting quickly. I can imagine that would happen when a node boots you immediately, or for some reason you’re cycling faster than every 10 minutes - if it takes longer a new circuit would be used automatically by Tor.

    Yes, it would reuse the same circuit. However, if the exit node you were using suddenly won’t allow you to reach your peer, Tor will automatically detach that “stream” (a.k.a. connection) from that bad circuit, and reattach it to a new circuit. Subsequently, if you try to use some other, previously-opened, outbound connection to a peer (which has the same index, and thus the same SOCKS5 username/password) which is still attached to that bad circuit, it’ll get automatically reattached to the same new circuit as the previous streams with identical SOCKS5 username/passwords. Therefore, you won’t keep connecting to the same suddenly-offline/censoring/misbehaving/whatever exit node, but Tor will automatically find a new working circuit for you, and still keep all your connections grouped by SOCKS5 username/password.

    So, yes, you should group connections, when possible. It’ll save on the number of total circuits needed, cutting the overhead by some O(M-N) where M is the total number of peers and N is the total number of peer “groups”.

    If that’s difficult or annoying to do, or there’s no potential use cases for grouping peer connections to the same circuit, then completely randomised SOCKS authentication is still much better than no SOCKS authentication at all.

    Although I’ve little authority to comment on the mergability of bitcoin patches, I did a quick read of @laanwj’s patch 67a7949 and it looks pretty good to me.

  29. laanwj commented at 7:50 am on May 7, 2015: member

    @sipa

    What happens when you use this socks5 authentication with a non-Tor socks5 proxy?

    • If the SOCKS5 proxy doesn’t support authentication (for example, ssh -D), it makes no difference. No token is sent.
    • If the proxy requires authentication then submitting random passwords will make it deny your connections just like submitting no password did before. I’ve never heard any requests requests for supporting authenticated proxies. However - such an option could be added trivially after this.
    • If the proxy supports authentication, but doesn’t require it, then this may cause it to reject connections as a user/password is sent where it wasn’t before. I think this is exceedingly rare apart from Tor. In this case -proxyrandomize=0 will have to be passed to disable the behavior. @isislovecruft Thanks a lot for looking over the patch and commenting here!

    So, yes, you should group connections, when possible. It’ll save on the number of total circuits needed, cutting the overhead by some O(M-N) where M is the total number of peers and N is the total number of peer “groups”.

    Right, makes sense. However in our case, outgoing connections are quite rare. We make only up to 8. So as I understand, it’ll never create a huge number of circuits. This makes it less of an issue, I suppose?

  30. isislovecruft commented at 9:32 pm on July 13, 2015: none

    @laanwj No problem; happy to help!

    Right, makes sense. However in our case, outgoing connections are quite rare. We make only up to 8. So as I understand, it’ll never create a huge number of circuits. This makes it less of an issue, I suppose?

    Oh, if it’s only 8 at a time, then you’re correct that it really doesn’t matter… the overhead is miniscule.

  31. gmaxwell added the label Privacy on Aug 18, 2015
  32. DrahtBot locked this on Sep 8, 2021

github-metadata-mirror

This is a metadata mirror of the GitHub repository bitcoin/bitcoin. This site is not affiliated with GitHub. Content is generated from a GitHub metadata backup.
generated: 2024-07-01 10:13 UTC

This site is hosted by @0xB10C
More mirrored repositories can be found on mirror.b10c.me