Delivery-Date: Mon, 06 Oct 2014 22:27:54 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 469F51E0F38;
	Mon,  6 Oct 2014 22:27:53 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A78B530F50;
	Tue,  7 Oct 2014 02:27:49 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 9252530F2F
 for <tor-talk@lists.torproject.org>; Tue,  7 Oct 2014 02:27:46 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at eugeni.torproject.org
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id S8gjx2BJR-nJ for <tor-talk@lists.torproject.org>;
 Tue,  7 Oct 2014 02:27:46 +0000 (UTC)
Received: from khazad-dum.seul.org (khazad-dum.csail.mit.edu [128.31.0.47])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (Client CN "moria.seul.org", Issuer "moria.seul.org" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 766323075C
 for <tor-talk@lists.torproject.org>; Tue,  7 Oct 2014 02:27:46 +0000 (UTC)
Received: by khazad-dum.seul.org (Postfix, from userid 501)
 id F3D481E0F38; Mon,  6 Oct 2014 22:27:43 -0400 (EDT)
Date: Mon, 6 Oct 2014 22:27:43 -0400
From: Roger Dingledine <arma@mit.edu>
To: tor-talk@lists.torproject.org
Message-ID: <20141007022743.GC54413@moria.seul.org>
References: <N1-N69tjFsg5O@Safe-mail.net>
MIME-Version: 1.0
Content-Disposition: inline
In-Reply-To: <N1-N69tjFsg5O@Safe-mail.net>
User-Agent: Mutt/1.5.20 (2009-12-10)
Subject: Re: [tor-talk] isp monitoring tor
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Mon, Oct 06, 2014 at 07:02:06PM -0400, garyr22@Safe-mail.net wrote:
> I'll read some documentation about these methods. Are there recommended sources?
> 
> > Tor is vulnerable to two general sorts of attacks.

I agree with the number two, but I would have picked different
attacks. The first is traffic correlation, which is the one discussed
in this thread. The second is website fingerprinting.

For the general background on Tor attacks, see
http://events.ccc.de/congress/2008/Fahrplan/events/2977.en.html
https://media.torproject.org/video/25c3-2977-en-security_and_anonymity_vulnerabilities_in_tor.mp4

For the traffic confirmation attack, see the links in
https://blog.torproject.org/blog/one-cell-enough

And for website fingerprinting, see
https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
https://www.eecs.berkeley.edu/~sa499/papers/ccs-webfp-final.pdf

--Roger

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

