skip to main content
10.1145/2815675.2815701acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Ting: Measuring and Exploiting Latencies Between All Tor Nodes

Published:28 October 2015Publication History

ABSTRACT

Tor is a peer-to-peer overlay routing network that achieves unlinkable communication between source and destination.Unlike traditional mix-nets, Tor seeks to balance anonymity and performance, particularly with respect to providing low-latency communication. As a result, understanding the latencies between peers in the Tor network could be an extremely powerful tool in understanding and improving Tor's performance and anonymity properties. Unfortunately, there are no practical techniques for inferring accurate latencies between two arbitrary hosts on the Internet, and Tor clients are not instrumented to collect and report on these measurements. In this paper, we present Ting, a technique for measuring latencies between arbitrary Tor nodes from a single vantage point. Through a ground-truth validation, we show that Ting is accurate, even with few samples, and does not require modifications to existing clients. We also apply Ting to the live Tor network, and show that its measurements are stable over time. We demonstrate that the all-pairs latency datasets that Ting permits can be applied in disparate ways, including faster methods of deanonymizing Tor circuits and efficiently finding long circuits with low end-to-end latency.

References

  1. S. Agarwal and J. R. Lorch. Matchmaking for online games and other latency-sensitive P2P systems. In ACM SIGCOMM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Akhoondi, C. Yu, and H. V. Madhyastha. LASTor: A low-latency AS-aware Tor client. In IEEE Symposium on Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. In Symposium on Privacy Enhancing Technologies (PETS), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84--88, Nov. 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Y. Chen, R. Sion, and B. Carbunar. XPay: Practical anonymous payments for Tor routing and other networked services. In Workshop on Privacy in the Electronic Society (WPES), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Cox, F. Dabek, F. Kaashoek, J. Li, and R. Morris. Practical, distributed network coordinates. In Workshop on Hot Topics in Networks (HotNets), 2003.Google ScholarGoogle Scholar
  7. R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Dingledine and S. J. Murdoch. Performance improvements on Tor or, why Tor is slow and what we're going to do about it. Online: https://www.torproject.org/press/presskit/2009-03--11-performance.pdf, 2009.Google ScholarGoogle Scholar
  9. N. S. Evans, R. Dingledine, and C. Grothoff. A practical congestion attack on Tor using long paths. In USENIX Security Symposium, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Gilad and A. Herzberg. Spying in the dark: TCP and Tor traffic analysis. In Privacy Enhancing Technologies, pages 100--119. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. P. Gummadi, S. Saroiu, and S. D. Gribble. King: Estimating latency between arbitrary Internet end hosts. In ACM Internet Measurement Workshop (IMW), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How much anonymity does network latency leak? ACM Transactions on Information and System Security (TISSEC), 13(2):13, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Jansen, J. Geddes, C. Wacek, M. Sherr, and P. Syverson. Never been KIST: Tor's congestion management blossoms with kernel-informed socket transport. In USENIX Security Symposium, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Johnson, C. Wacek, R. Jansen, M. Sherr, and P. Syverson. Users get routed: Traffic correlation on Tor by realistic adversaries. 2013.Google ScholarGoogle Scholar
  15. C. Lumezanu, R. Baden, D. Levin, N. Spring, and B. Bhattacharjee. Symbiotic relationships in Internet routing overlays. In Symposium on Networked Systems Design and Implementation (NSDI), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. J. Murdoch and G. Danezis. Low-cost traffic analysis of Tor. In USENIX Security Symposium, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Neustar IP Geolocation.hrefhttps://www.neustar.biz/services/ip-intelligence https://www.neustar.biz/services/ip-intelligence.Google ScholarGoogle Scholar
  18. T. E. Ng and H. Zhang. Towards global network positioning. In ACM Internet Measurement Workshop (IMW), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T.-W. Ngan, R. Dingledine, and D. S. Wallach. Building incentives into Tor. In Financial Cryptography (FC), 2010.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Panchenko and J. Renner. Path selection metrics for performance-improved onion routing. In Symposium on Applications and the Internet (SAINT), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. L. Peterson, T. Anderson, D. Culler, and T. Roscoe. A blueprint for introducing disruptive technology into the Internet. In Workshop on Hot Topics in Networks (HotNets), 2002.Google ScholarGoogle Scholar
  22. M. K. Reiter and A. D. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, 1(1):66--92, Nov. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Reporters Without Borders. Enemies of the Internet 2013 Report. https://surveillance.rsf.org/en/wp-content/uploads/sites/2/2013/03/enemies-of-the-internet_2013.pdf, Mar. 2013.Google ScholarGoogle Scholar
  24. RIPE NCC. RIPE Atlas. https://atlas.ripe.net.Google ScholarGoogle Scholar
  25. SamKnows. https://www.samknows.com.Google ScholarGoogle Scholar
  26. S. Savage, A. Collins, E. Hoffman, J. Snell, and T. Anderson. The end-to-end effects of Internet path selection. In ACM SIGCOMM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. A. Schulman and N. Spring. Pingin' in the rain. In ACM Internet Measurement Conference (IMC), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Sherr, M. Blaze, and B. T. Loo. Scalable link-based relay selection for anonymous routing. In Privacy Enhancing Technologies Symposium (PETS), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. R. Sherwood, B. Bhattacharjee, and A. Srinivasan. P5: A protocol for scalable anonymous communication. Journal of Computer Security, 13(6):839--876, 2005. Google ScholarGoogle ScholarCross RefCross Ref
  30. Stem Controller Library. https://stem.torproject.org.Google ScholarGoogle Scholar
  31. S. Sundaresan, S. Burnett, N. Feamster, and W. De Donato. BISmark: A testbed for deploying measurements and applications in broadband access networks. In USENIX Annual Technical Conference, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Tor Metrics. https://metrics.torproject.org.Google ScholarGoogle Scholar
  33. B. Wong, I. Stoyanov, and E. G. Sirer. Octant: A comprehensive framework for the geolocalization of Internet hosts. In Symposium on Networked Systems Design and Implementation (NSDI), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Ting: Measuring and Exploiting Latencies Between All Tor Nodes

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '15: Proceedings of the 2015 Internet Measurement Conference
          October 2015
          550 pages
          ISBN:9781450338486
          DOI:10.1145/2815675

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 October 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          IMC '15 Paper Acceptance Rate31of96submissions,32%Overall Acceptance Rate277of1,083submissions,26%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader