Holes found in Tor IP privacy system
- 20 October, 2006 10:00
A research team has published techniques it claims could be used to unmask the IP addresses of people using the The Onion Router (Tor) privacy system.
The report's lead author, Andrew Christensen of Danish security consultancy FortConsult, uses Practical Onion Hacking to detail how the anonymity of the system could be undermined by tampering with traffic going through the server through which traffic exits Tor, the so-called "exit node."
Tor is an IP tunnelling system that allows users to connect to web servers without revealing their IP address, and therefore their location or identity. Endorsed by the Electronic Frontier Foundation (EFF), the system uses a series of special servers or "nodes" that route traffic using encryption without storing information about a connection's address origins. The destination web server sees only the exit node -- the last node in the chain -- rather than the real address.
The system's free-speech advocates point to its use to circumvent web restrictions in countries such as China in its favor, though others have criticized it as providing a way for child pornographers and criminals to hide their interests. Others think the system is so riddled with hypothetical insecurities caused by misconfiguration as to make it useful only to experts.
"We have not found any weaknesses in Tor - but instead demonstrated weaknesses/features of the software that uses Tor can be exploited to take away people's privacy/anonymity," concludes Christensen. "We believe we have demonstrated that it is entirely possible to unmask a good portion of the traffic transiting Tor, since it is being viewed using Firefox and Internet Explorer, and is transmitted cleartext."
The new report follows up a previous report, Peeling the Onion, that outlined the vulnerabilities in a more theoretical light.