Tor 仍然可以安全使用吗? Is Tor still safe to use?

原始链接: https://blog.torproject.org/tor-is-still-safe/

调查人员发现了一种通过有针对性的执法攻击,利用已停止使用的应用程序 Ricochet 的旧版本,对使用 Onion 服务的 Tor 用户进行去匿名化的方法。 该技术涉及“守卫发现”攻击,攻击者识别 Tor 网络上的用户入口点 (Guard)。 该漏洞源于用户使用了过时版本的 Ricochet,缺乏后来添加的防止此类攻击的保护措施,包括 Vanguards-lite 和类似的增强功能。 这些保障措施存在于最新版本的 Ricochet-Refresh 中,这是已放弃的 Ricochet 项目的持续开发分支。 调查显示,记录通过 Tor 网络建立的连接的 Netflow 数据在此次攻击中发挥了重要作用。 由于 Guard 上检测到的用户数量较少,攻击者可以根据目标用户的 Onion 服务描述可用性有效地识别出目标用户的活跃时段。 Tor 用户应定期更新其软件以避免此类风险。 对于全球大多数在浏览时寻求隐私的人来说,Tor 仍然是最佳选择。 Tor 网络总体运行良好。 鉴于在负责任的披露讨论中共享的信息不足,Tor 官员选择公开发布有关该事件的详细信息,并要求任何对此事有相关见解的人提供更多信息。 他们敦促知情人士通过 [email protected] 分享,并强调保护数百万依赖用户的 Onion Services 的重要性。 如果需要,可以将加密的电子邮件发送到上述地址,并且可以在此处访问关联的 OpenPGP 公钥:[keys.openpgp.org](http://keys.openpgp.org)。 尽管人们一直担心 Tor 出口节点集中在特定区域或实体,但这种特殊攻击主要与古代 Ricochet 应用程序的独特版本有关,没有旨在阻止指定时序分析的现代安全功能。 Tor 项目承认多元化退出节点的重要性,并与社区进行对话,共同应对共同挑战。 此外,在过去几年中,Tor 网络的性能也得到了改善,带宽的增加证明了这一点,从而带来了更快的速度。 作为扩展 Tor 网络不断努力的一部分,我们鼓励志愿者提供额外的带宽和中继,以促进网络内的多样性

Investigators uncovered a method to de-anonymize a Tor user utilizing Onion services via a targeted law enforcement assault, exploiting an older version of Ricochet, a discontinued app. The technique involves a "guard discovery" attack where the attacker identifies the user's entry point (Guard) on the Tor network. The vulnerability originates from the fact that the user employed an obsolete version of Ricochet lacking protective measures added later to prevent such attacks, including Vanguards-lite and similar enhancements. These safeguards exist in the latest edition of Ricochet-Refresh, a sustained development branch of the abandoned Ricochet project. The investigation reveals that netflow data, which records connections made through the Tor network, played a significant role in the attack. With a lower volume of users detected on the Guard, the attacker efficiently identified the active periods of the target user based on their Onion service description availability. Tor users should keep their software updated regularly to avoid such risks. For most individuals globally seeking privacy while browsing, Tor remains the optimal choice. The Tor Network continues operating well overall. In light of insufficient information shared during responsible disclosure discussions, Tor officials opted to release details about the incident publicly, requesting further information from anyone possessing relevant insights into the matter. They urge those with knowledge to share it with [email protected], stressing the importance of protecting Onion Services for millions of dependent users. Encrypted emails may be sent to the aforementioned address if desired, and the associated OpenPGP public key can be accessed here: [keys.openpgp.org](http://keys.openpgp.org). Despite ongoing concerns regarding the concentration of Tor exit nodes in specific regions or entities, this particular attack is primarily connected to a distinct version of the ancient Ricochet app without modern safety features designed to thwart the specified timing analysis. The Tor Project acknowledges the significance of diverse exits nodes and engages in dialogues with the community to tackle common challenges jointly. Additionally, improvements have been observed in the Tor network's performance over the past several years, evidenced by growing bandwidth, resulting in greater speed. As part of continuous efforts to expand the Tor network, volunteers are encouraged to offer extra bandwidth and relays to promote diversity within the


We are writing this blog post in response to an investigative news story looking into the de-anonymization of an Onion Service used by a Tor user using an old version of the long-retired application Ricochet by way of a targeted law-enforcement attack. Like many of you, we are still left with more questions than answers--but one thing is clear: Tor users can continue to use Tor Browser to access the web securely and anonymously. And the Tor Network is healthy.

Please note, that for the great majority of users worldwide that need to protect their privacy while browsing the Internet, Tor is still the best solution for them. We encourage all Tor users and relay operators to always keep software versions up to date.

From the limited information The Tor Project has, we believe that one user of the long-retired application Ricochet was fully de-anonymized through a guard discovery attack. This was possible, at the time, because the user was using a version of the software that neither had Vanguards-lite, nor the vanguards addon, which were introduced to protect users from this type of attack. This protection exists in Ricochet-Refresh, a maintained fork of the long-retired project Ricochet, since version 3.0.12 released in June of 2022.

Vanguards-lite, released in Tor 0.4.7, protects against the possibility of combining an adversary-induced circuit creation with circuit-based covert channel to obtain a malicious middle relay confirmed to be next to the user's Guard. Once the Guard is obtained, netflow connection times can be used to find the user of interest. In this case, the netflow attack could proceed quickly, because the attacker was able to determine when the user was online and offline due to their Onion Service descriptor being available, combined with the low number of users on the discovered Guard.

Responsible Disclosure

In contrast to the CCC, Chaos Computer Club, who was provided access to the documents related to the case and was able to analyze and validate the reporter's assumptions, we were only provided a vague outline and asked broad clarifying questions that left us with uncertainty of the facts, and questions of our own. While we appreciate the journalist contacting us, this same access was not given to the Tor Project.

Given the potential risk to our users, we decided to go public. We requested that anyone with additional information about the case share it with us. This would allow us to conduct our own analysis and determine the best course of action to protect our users.

To be clear, The Tor Project did not intend to ask for the sources of the story, but sought to understand what evidence existed for a de-anonymization attack to accurately respond to the investigating reporter's questions and assess our disclosure responsibilities. And we continue to have an interest in obtaining more information about how Onion Services users were de-anonymized. If we had access to the same documents as CCC, it would be possible to produce a report with more clarity regarding the actual state of the Tor network and how it affects the great majority of its users.

We need more details about this case. In the absence of facts, it is hard for us to issue any official guidance or responsible disclosures to the Tor community, relay operators, and users.

We are calling for more information from you.

If you have any information that can help us learn more about this alleged attack, please email [email protected].

If you want to encrypt your mail, you can get the OpenPGP public key for this address from keys.openpgp.org. Fingerprint: 835B 4E04 F6F7 4211 04C4 751A 3EF9 EF99 6604 DE41

Your assistance will help all of us take the necessary steps and precautions to keep Onion Services safe for the millions of users that rely on the protections Tor provides.

A healthy network

It is important to note that Onion Services are only accessible from within the Tor network, which is why the discussion of exit nodes is irrelevant in this case. But we would like to share that the number of exit nodes has significantly increased over the past two years, with over 2,000 now available. To the best of our knowledge, the attacks happened between 2019-2021.

While it is fair to question the concentration of these nodes in certain countries or operations, this has very little to do with the described attack from what we learned in the articles published so far. The attacks occurred on an old version of the long-retired application Ricochet that lacked new features The Tor Project has released since to mitigate against the kind of 'timing' analysis described in the articles. The most current versions of Ricochet-Refresh have such protections in place.

Another important thing to mention is the longevity of the user connection for such 'timing' analysis to be successful. A Tor Browser user that does not maintain its connection for a long time, is less vulnerable to such analyses.

After the period of the attacks described to us, 2019-2021, our Network Health team has flagged thousands of bad relays which the Directory Authorities then voted to remove. Those included many that would come from a single operator or tried to enter the network in large scales. The Network Health team has implemented processes to identify possible large groups of relays that are suspected to be managed by single operators and bad actors and not allow them to join the network.

The Tor Project knows that diversity of relays is a pressing issue for the Tor community and we are having many conversations with our community and relay operators about this subject to understand how we can address common pain points together.

Over the last year alone, we've launched a number of new initiatives such as the EFF's Tor University Challenge and the introduction of the Tor's network health API at DEF CON 32 earlier this year. Tor's bandwidth has actually increased substantially in recent years, as shown in this link: https://metrics.torproject.org/bandwidth.html?start=2013-06-20&end=2024-09-18. This means the Tor network is faster than it has ever been. And we continue to conduct outreach campaigns and efforts to grow the network. 

You can help

We encourage those who can to volunteer and contribute bandwidth and relays to grow and diversify the Tor network. By ensuring hardware, software, and geographic diversity of the Tor network, we can continue to significantly minimize the potential for abuse and surveillance on the Tor network--and make guard attacks even harder to execute. As far as the Tor community is concerned, the best way to ensure network health, protect users and relay operators is keeping Tor software up to date and following the guidance that we publish on the Tor Project's official channels.

It is important to remember that Tor is one of the few alternatives that provide a vision and actionable model for a decentralized Internet that make this sort of attack impractical for those who seek to surveil a large portion of internet users. Yet, as of today, Tor is still bound by the limitations of an internet ecosystem that is predominantly owned and governed by only a handful of large corporations. 


We will continue to update this blog post as more information becomes available.

相关文章
联系我们 contact @ memedata.com