Researchers mount successful attacks against Tor network—and show how to prevent them

July 29, 2015 by Larry Hardesty, Massachusetts Institute of Technology
Credit: iStock

With 2.5 million daily users, the Tor network is the world's most popular system for protecting Internet users' anonymity. For more than a decade, people living under repressive regimes have used Tor to conceal their Web-browsing habits from electronic surveillance, and websites hosting content that's been deemed subversive have used it to hide the locations of their servers.

Researchers at MIT and the Qatar Computing Research Institute (QCRI) have now demonstrated a vulnerability in Tor's design. At the Usenix Security Symposium this summer, they show that an adversary could infer a hidden server's location, or the source of the information reaching a given Tor user, by analyzing the traffic patterns of encrypted data passing through a single computer in the all-volunteer Tor network.

Fortunately, the same paper also proposes defenses, which representatives of the Tor project say they are evaluating for possible inclusion in future versions of the Tor software.

"Anonymity is considered a big part of freedom of speech now," says Albert Kwon, an MIT graduate student in electrical engineering and and one of the paper's first authors. "The Internet Engineering Task Force is trying to develop a human-rights standard for the Internet, and as part of their definition of freedom of expression, they include anonymity. If you're fully anonymous, you can say what you want about an authoritarian government without facing persecution."

Layer upon layer

Sitting atop the ordinary Internet, the Tor network consists of Internet-connected computers on which users have installed the Tor software. If a Tor user wants to, say, anonymously view the front page of The New York Times, his or her computer will wrap a Web request in several layers of encryption and send it to another Tor-enabled computer, which is selected at random. That computer—known as the guard—will peel off the first layer of encryption and forward the request to another randomly selected computer in the network. That computer peels off the next layer of encryption, and so on.

The last computer in the chain, called the exit, peels off the final layer of encryption, exposing the request's true destination: the Times. The guard knows the Internet address of the sender, and the exit knows the Internet address of the destination site, but no computer in the chain knows both. This routing scheme, with its successive layers of encryption, is known as onion routing, and it gives the network its name: "Tor" is an acronym for "the onion router."

In addition to anonymous Internet browsing, however, Tor also offers what it calls hidden services. A hidden service protects the anonymity of not just the browser, but the destination site, too. Say, for instance, that someone in Iran wishes to host a site archiving news reports from Western media but doesn't want it on the public Internet. Using the Tor software, the host's computer identifies Tor routers that it will use as "introduction points" for anyone wishing to access its content. It broadcasts the addresses of those introduction points to the network, without revealing its own location.

If another Tor user wants to browse the hidden site, both his or her computer and the host's computer build Tor-secured links to the introduction point, creating what the Tor project calls a "circuit." Using the circuit, the browser and host identify yet another router in the Tor network, known as a rendezvous point, and build a second circuit through it. The location of the rendezvous point, unlike that of the introduction point, is kept private.

Traffic fingerprinting

Kwon devised an attack on this system with joint first author Mashael AlSabah, an assistant professor of computer science at Qatar University, a researcher at QCRI, and, this year, a visiting scientist at MIT; Srini Devadas, the Edwin Sibley Webster Professor in MIT's Department of Electrical Engineering and Computer Science; David Lazar, another in and computer science; and QCRI's Marc Dacier.

The researchers' attack requires that the adversary's computer serve as the guard on a Tor circuit. Since guards are selected at random, if an adversary connects enough computers to the Tor network, the odds are high that, at least on some occasions, one or another of them would be well-positioned to snoop.

During the establishment of a circuit, computers on the Tor network have to pass a lot of data back and forth. The researchers showed that simply by looking for patterns in the number of packets passing in each direction through a guard, machine-learning algorithms could, with 99 percent accuracy, determine whether the circuit was an ordinary Web-browsing circuit, an introduction-point circuit, or a rendezvous-point circuit. Breaking Tor's encryption wasn't necessary.

Furthermore, by using a Tor-enabled computer to connect to a range of different hidden services, they showed that a similar analysis of traffic patterns could identify those services with 88 percent accuracy. That means that an adversary who lucked into the position of guard for a hosting a hidden service, could, with 88 percent certainty, identify it as the service's host.

Similarly, a spy who lucked into the position of guard for a user could, with 88 percent accuracy, tell which sites the user was accessing.

To defend against this type of attack, "We recommend that they mask the sequences so that all the sequences look the same," AlSabah says. "You send dummy packets to make all five types of circuits look similar."

"For a while, we've been aware that circuit fingerprinting is a big issue for hidden services," says David Goulet, a developer with the Tor project. "This paper showed that it's possible to do it passively—but it still requires an attacker to have a foot in the network and to gather data for a certain period of time."

"We are considering their countermeasures as a potential improvement to the hidden service," he adds. "But I think we need more concrete proof that it definitely fixes the issue."

Explore further: Computer scientists present guarantees for online anonymity

Related Stories

Computer scientists present guarantees for online anonymity

March 11, 2015

Anonymity on the Internet is possible only up to a certain degree. Therefore, it is possible that others may see who is visiting an online advice site on sexual abuse, or who frequently looks up information about a certain ...

Tor and Bitcoin promise online stealth

October 2, 2013

The Silk Road website that was shut down by US authorities, who branded it a black market for drugs and other illicit wares, relied on Tor and Bitcoins to protect the anonymity of users.

Instant messaging will get Tor treatment in TIMB

March 3, 2014

The Tor Foundation which has made it possible for privacy-bent Tor users to anonymously browse the web is now turning to enabling people to autonomously do instant messaging with a Tor-enabled service, dubbed Tor Instant ...

Is Tor still secure after Silk Road?

February 6, 2015

The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software that allows anonymous, ...

Facebook has URL for users running Tor-enabled browsers

November 1, 2014

A reassuring message on Friday from Facebook: "It's important to us at Facebook to provide methods for people to use our site securely." That is why Facebook implemented HTTPS across the service and Perfect Forward Secrecy, ...

Next question: can the NSA crack Tor keys?

September 9, 2013

( —"After more revelations, and expert analysis, we still aren't precisely sure what crypto the NSA can break. But everyone seems to agree that if anything, the NSA can break 1024 RSA/DH [DH refers to Diffie-Hellman] ...

Recommended for you

Technology near for real-time TV political fact checks

January 18, 2019

A Duke University team expects to have a product available for election year that will allow television networks to offer real-time fact checks onscreen when a politician makes a questionable claim during a speech or debate.

Privacy becomes a selling point at tech show

January 7, 2019

Apple is not among the exhibitors at the 2019 Consumer Electronics Show, but that didn't prevent the iPhone maker from sending a message to attendees on a large billboard.

China's Huawei unveils chip for global big data market

January 7, 2019

Huawei Technologies Ltd. showed off a new processor chip for data centers and cloud computing Monday, expanding into new and growing markets despite Western warnings the company might be a security risk.

1 comment

Adjust slider to filter visible comments by rank

Display comments: newest first

5 / 5 (1) Jul 29, 2015
Tell me something I do not know. That's the way to defeat Tor as well as Bitcoin network and it was already done. And the solution the "experts" propose is all based on "redundancy decoys" faking massive flood traffic which would make NSA work harder to spy but not impossible with side effect of slowing already slow Tor network. But what defeats all is fact that Tor user is visible on the network and hence can be hack by spoofing e-mail and "open" website or by other means to get spyware reading users keyboard and all your passwords. also since Tor is just a network of encrypted proxy serves it could be blocked as China does daily. This is the IP that makes it impossible to defeat internet spying though there are methods to delay detection.That's all.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.