Reference Hub1
TLS Certificates of the Tor Network and Their Distinctive Features

TLS Certificates of the Tor Network and Their Distinctive Features

Vitaly V. Lapshichyov
Copyright: © 2019 |Volume: 10 |Issue: 2 |Pages: 24
EISBN13: 9781522566694|ISSN: 2640-4265|EISSN: 2640-4273|DOI: 10.4018/IJSSSP.2019070102
Cite Article Cite Article

MLA

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features." IJSSSP vol.10, no.2 2019: pp.20-43. http://doi.org/10.4018/IJSSSP.2019070102

APA

Lapshichyov, V. V. (2019). TLS Certificates of the Tor Network and Their Distinctive Features. International Journal of Systems and Software Security and Protection (IJSSSP), 10(2), 20-43. http://doi.org/10.4018/IJSSSP.2019070102

Chicago

Lapshichyov, Vitaly V. "TLS Certificates of the Tor Network and Their Distinctive Features," International Journal of Systems and Software Security and Protection (IJSSSP) 10, no.2: 20-43. http://doi.org/10.4018/IJSSSP.2019070102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article presents the results of an experimental study of the properties of SSL/TLS certificates of an anonymous Tor network, based on which it is concluded that there are several features that differ from other SSL/TLS certificates. At present, in the scientific literature and in the documentation of U.S. National Security Agency, and the U.K. Government Communications Headquarters devoted to the identification of Tor network traffic, two signs of SSL/TLS certificates are indicated - the name of the certificate subject, as well as the port of the certificate transmission and network connection. The results of an experimental study allow the authors to state with a high degree of probability that Tor network certificates can be identified in the data stream between the client and server of the specified network by their size, which is between 400 and 600 bytes. The list of features of the Tor network certificates is intended to develop software or add-ons to existing ones, which is used to block access of Internet users to Darknet resources or to limit the use of the Tor anonymous network service. Based on data on the distinguishing features of Tor network certificates, an algorithm is proposed for blocking access to the Internet for users of the Tor Bundle.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.