Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-09-09 Thread George Kadianakis
Mike Perry writes: > George Kadianakis: >> Hello there, >> >> recently we've been busy specifying various important improvements to entry >> guard security. For instance see proposals 250, 241 and ticket #16861. >> >> Unfortunately, the current guard codebase is dusty and full of problems (see

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-09-02 Thread Mike Perry
George Kadianakis: > Hello there, > > recently we've been busy specifying various important improvements to entry > guard security. For instance see proposals 250, 241 and ticket #16861. > > Unfortunately, the current guard codebase is dusty and full of problems (see > #12466, #12450). We believe

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-21 Thread Paul Syverson
Hi Leeroy, On Fri, Aug 21, 2015 at 08:09:13AM -0400, l.m wrote: > Hi, > > I'm curious what analysis has been done against a gateway adversary. > In particular dealing with the effectiveness of entry guards against > such an adversary. There's a part of me that thinks it doesn't work at > all for

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-21 Thread l.m
Hi, I'm curious what analysis has been done against a gateway adversary. In particular dealing with the effectiveness of entry guards against such an adversary. There's a part of me that thinks it doesn't work at all for this case. Only because I've been studying such an adversary at the AS-level

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-21 Thread George Kadianakis
s7r writes: > Hi, > Hello, thanks for the feedback! I pushed some small updates to my branch based on your comments. You can check them out here: https://gitweb.torproject.org/user/asn/tor.git/tree/src/or/guardlist.c?h=bug12595 > On 8/20/2015 2:28 PM, George Kadianakis wrote: >> Hello ther

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-21 Thread George Kadianakis
isis writes: > George Kadianakis transcribed 5.2K bytes: >> >> - This new design focuses on protecting against path bias attacks, by >> slightly >> damaging our reachability. >> >> Specifically, the old design is better at recovering in filtered networks, >> because it will keep on adding

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread isis
George Kadianakis transcribed 5.2K bytes: > > - This new design focuses on protecting against path bias attacks, by slightly > damaging our reachability. > > Specifically, the old design is better at recovering in filtered networks, > because it will keep on adding new nodes till one succeed

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread teor
> On 21 Aug 2015, at 00:07, s7r wrote: > > Can you suggest a retry amount and time interval? I think 10 times > once every 20 minutes for the Guards we selected but never connected > to and double or even triple that for the Guards we remember we were > once able to connect to is reasonable. Th

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread l.m
> Thanks for the input! Hey, no problem. Thank you for working on this too. > Can you suggest a retry amount and time interval? If the adversary is at the gateway and can do filtering, they pretty much want some rotation. Whatever that reason may be (choose a guard you've already chosen, or choo

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Thanks for the input! On 8/20/2015 4:59 PM, l.m wrote: > >> "b) ..." > > Retrying guards is the crux of the problem. If you blindly retry > guards, even to prevent rotation, you eventually come to a hard > place where this will backfire badly

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread l.m
> "a) The network is not hostile and allows access just fine, but..." This came up before didn't it. Nick mentioned that the question `network down` isn't the easiest question to answer portably. Supposing such a network could have it's properties (like route) enumerated this might provide anothe

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Also, we should choose a reasonable amount of retry attempts at reasonable time periods for the Guards in primary_guard_set, for the following reasons: a) The network is not hostile and allows access just fine, but: - - the user walked out the signa

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread s7r
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, On 8/20/2015 2:28 PM, George Kadianakis wrote: > Hello there, > > recently we've been busy specifying various important improvements > to entry guard security. For instance see proposals 250, 241 and > ticket #16861. > > Unfortunately, the c

Re: [tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread l.m
Hello, > "To improve our algorithm and make it more robust we need to understand further what kind of path bias attacks are relevant here...What nasty attacks can this adversary do?" An gateway adversary which can filter the network can use guards to fingerprint you. This requires connecting to t

[tor-dev] [RFC] On new guard algorithms and data structures

2015-08-20 Thread George Kadianakis
Hello there, recently we've been busy specifying various important improvements to entry guard security. For instance see proposals 250, 241 and ticket #16861. Unfortunately, the current guard codebase is dusty and full of problems (see #12466, #12450). We believe that refactoring and cleaning up