Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 111,377 of 112,125    |
|    Gabx to All    |
|    Extending Tor circuit lengths    |
|    03 Jun 25 16:09:21    |
      XPost: alt.privacy.anon-server, sci.crypt       From: virebent@tcpreset.invalid              There have been a lot of discussion and flames lately about extending Tor       circuit lengths       beyond the standard 3 hops.       While the theoretical anonymity benefits are       appealing, I think we need a reality check on the serious risks that most       people are glossing over.              ## Performance Degradation (The Obvious One)              Every additional hop roughly doubles your latency. 3 hops → 4 hops isn't       just 33% slower, it's often 80-100% slower in practice due to:              - Circuit establishment overhead multiplying       - More points where packet loss can occur       - Increased jitter and timing variance       - Buffer bloat accumulation across nodes              For browsing, this makes Tor nearly unusable.              ## The Failure Cascade Problem              Standard Tor has ~99.2% circuit success rate. Each additional hop roughly       adds another 0.5-1% failure chance. Sounds small until you realize:              - 3 hops: ~1% circuit failure       - 5 hops: ~3-4% circuit failure       - 7 hops: ~6-8% circuit failure              Your connection becomes unreliable fast. Nothing worse than a circuit       dying mid-session when you're trying to access something important.              ## Fingerprinting Risk (The Big One)              This is where extended hops can actually REDUCE your anonymity. If only       0.1% of Tor users are running modified clients with variable hop counts,       you become part of a tiny, easily identifiable subset.              Research showed that behavioral anomalies can be       fingerprinted even through Tor.       Using non-standard circuit lengths is       a massive red flag that screams "this user is running modified software."              Unless EVERYONE adopts this (spoiler: they won't), you're making yourself       more traceable, not less.              ## Resource Exhaustion Attack Vector              Extended circuits consume disproportionately more network resources:              - Each relay has to maintain more state       - Memory usage increases linearly per extra hop       - Processing overhead for crypto operations multiplies       - Bandwidth allocation becomes inefficient              A small number of users running 7+ hop circuits could severely degrade       network performance for everyone.       *This is basically a DoS attack* on the       Tor network, even if unintentional.              ## The "More Hops = More Compromised Nodes" Paradox              Standard Tor assumes some percentage of nodes are compromised/monitored.       Let's say 10% of exit nodes and 5% of middle nodes are hostile.              3-hop circuit compromise probability: ~10.5%       5-hop circuit compromise probability: ~19.8%       7-hop circuit compromise probability: ~28.7%              You're not just adding hops, you're exponentially increasing your chances       of hitting a compromised node somewhere in the path.              ## Implementation Complexity = Security Bugs              Modifying core Tor routing logic introduces new attack surfaces:              - Path selection bugs could leak information       - Memory management errors with dynamic lengths       - Race conditions in circuit building       - Potential for traffic confirmation via timing              The Tor codebase is already complex enough. Adding variable-length routing       means more code paths, more edge cases, more opportunities for critical       security bugs.              ## Timing Analysis Becomes EASIER              Counter-intuitively, variable hop lengths can make certain timing attacks       more effective, not less. Attackers can:              - Measure circuit build times to estimate path length       - Use latency variations to fingerprint your routing patterns       - Correlate path lengths with user behavior patterns       - Exploit timing side-channels in the modified client              Academic research showed that some anonymity systems       actually become LESS secure when you add complexity trying to improve them.              ## The Sybil Attack Amplification              With longer circuits, a Sybil attacker running multiple malicious nodes       has better odds of controlling multiple points in your path:              - 3 hops: Low chance of controlling 2+ positions       - 7 hops: Significantly higher chance of controlling 3+ positions              Once an attacker controls multiple hops in your circuit, game over.              ## Real-World Testing Reality              I've been running modified Tor clients with extended circuits for research.       Reality check:              - 90% of websites timeout on 6+ hop circuits       - Video streaming is completely broken       - Even email becomes frustratingly slow       - Circuit build failures every 10-15 attempts       - Memory usage 3x higher than standard Tor              ## The Academic vs. Practical Gap              Most papers discussing extended Tor circuits are purely theoretical or       tested on tiny laboratory networks. Real-world deployment faces:              - Heterogeneous relay performance       - Variable network conditions       - Diverse client hardware capabilities       - ISP-level traffic shaping       - Geographic routing suboptimalities              What works in simulation fails in practice.              ## The Non-Real-Time Exception (Sort Of)              Now, to be fair, extended circuits DO become somewhat more tolerable for       non-real-time protocols like:              - Email (SMTP/IMAP sessions)       - Usenet posting/reading (NNTP)       - File transfers (when you can wait)       - Async messaging protocols              The performance hit is still there, but users can tolerate 30-second delays       for sending an email vs. 30-second delays loading every webpage.              **HOWEVER** - and this is crucial - improved performance tolerance doesn't       magically fix any of the other serious security issues:              - You're still fingerprinting yourself as using modified Tor       - Circuit failure rates are still 3-8x higher       - You're still hitting more potentially compromised nodes       - Resource exhaustion on the network still happens       - Implementation bugs still exist       - Timing attacks are still viable       - Sybil attackers still get more opportunities              Don't let "it's usable for email" fool you into thinking extended circuits       are suddenly safe.       The performance problem is just ONE of many serious       issues.              --- Digital Signature ---       oF0MnTP+pwPNMAsZSV8EIP352iq5MiNYsRAareEPl5ZSzTjjJsc3IVPd0Ja5njzp       yWpO33/e+41KbObew6VBg==              --- SoupGate-DOS v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca