Abstract
Tor is a popular anonymity network which achieves its anonymity by constructing paths over three Tor relays, so-called circuits. Multiple streams that correspond to TCP connections can be multiplexed over a single circuit. By default, circuits are used for about ten minutes before switching to new circuits. Once that time limit is reached the circuit cannot be used for any new streams. This time-window is called the maximum circuit dirtiness (MCD). This paper analyzes the consequences of changing the MCD for all clients in the network and provides data on how changing the MCD affects various metrics of the Tor network. Our analysis shows that reducing the MCD to a sane value has almost no impact on the clients. Neither performance nor anonymity of the clients are significantly affected by the MCD. On the relays however halving the default MCD reduces the memory usage by about 20% while maintaining the original throughput and no measurable increase in CPU usage. Raising the MCD shows the opposite effect and increases memory usage. By drastically reducing the MCD, a significant number of extra circuits are created. From a performance point of view, the MCD should be reduced. Building on this work, side effects on specific attacks on Tor should be investigated in future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Available at https://github.com/kevinkoester/tornettools_manager.
References
AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The path less travelled: overcoming tor’s bottlenecks with traffic splitting. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 143–163. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39077-7_8
Diaz, C.: Anonymity metrics revisited. In: Dagstuhl Seminar Proceedings. Schloss Dagstuhl-Leibniz-Zentrum für Informatik (2006)
Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 54–68. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_5
Google Inc., Let’s Make the Web Faster - Google Code, 26 May 2010. https://web.archive.org/web/20120324082535/https://code.google.com/speed/articles/web-metrics.html. Accessed 13 Jan 2022
Hanley, H., et al.: DPSelect: a differential privacy based guard relay selection algorithm for Tor. In: PoPETs 2019, no. 2 (2019)
Heaptrack. KDE Applications. https://apps.kde.org/heaptrack/. Accessed 13 Jan 2022
HTTP Archive: Page Weight (2021). https://archive.org/reports/page-weight. Accessed 06 Jan 2022
Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. IET Commun. 13(17), 2723–2734 (2019)
Jansen, R.: Shadow - the shadow simulator. https://shadow.github.io/. Accessed 13 Jan 2022
Jansen, R.: Shadow/Tornettools. shadow, 10 July 2021. https://github.com/shadow/tornettools. Accessed 13 Jan 2022
Jansen, R., Hopper, N.: Shadow: running tor in a box for accurate and efficient experimentation (2012)
Jansen, R., Johnson, A.: Safely measuring tor. In: CCS, pp. 1553–1567. ACM (2016)
Jansen, R., Tracey, J., Goldberg, I.: Once is never enough: foundations for sound statistical inference in tor network experimentation. arXiv preprint arXiv:2102.05196 (2021)
Jansen, R., Traudt, M., Hopper, N.: Privacy-preserving dynamic learning of tor network traffic. In: CCS, pp. 1944–1961. ACM (2018). https://doi.org/10.1145/3243734.3243815
Johnson, A., et al.: Users get routed: traffic correlation on tor by realistic adversaries. In: CCS, pp. 337–348. ACM (2013)
Kim, H., Lee, S., Kim, J.: Inferring browser activity and status through remote monitoring of storage usage. In: ACSAC, pp. 410–421. ACM (2016). https://doi.org/10.1145/2991079.2991080
Kiran, K., et al.: Anonymity and performance analysis of stream isolation in tor network. In: ICCCNT, pp. 1–6. IEEE (2019)
Koch, R., Golling, M., Rodosek, G.D.: Disequilibrium: tor’s exit node selection under the stereoscope. In: Trustcom/BigDataSE/ISPA, vol. 1, pp. 942–949. IEEE (2015)
Mani, A., et al.: Understanding tor usage with privacy-preserving measurement. In: IMC, pp. 175–187 (2018)
Perry, M., et al.: The design and implementation of the tor browser [DRAFT]. 15 June 2018. https://2019.www.torproject.org/projects/torbrowser/design/. Accessed 13 Jan 2022
Resource.h « Linux « Uapi « Include - Kernel/Git/Torvalds/Linux.Git - Linux Kernel Source Tree. https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/include/uapi/linux/resource.h#n66. Accessed 13 Jan 2022
Jansen, R.: OnionTrace. shadow, 6 October 2020. https://github.com/shadow/oniontrace. Accessed 13 Jan 2022
Jansen, R.: TGen. shadow, 6 October 2020. https://github.com/shadow/tgen. Accessed 13 Jan 2022
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36467-6_4
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)
Shen, S., Gao, J., Wu, A.: Weakness identification and flow analysis based on tor network. In: CNS, pp. 90–94. IEEE (2018)
Sun, Y., et al.: RAPTOR: routing attacks on privacy in tor. In: Usenix Security, pp. 271–286 (2015)
Syverson, P., Dingledine, R., Mathewson, N.: Tor: the second-generation onion router, pp. 303–320 (2004)
The Tor Project. Welcome to Tor Metrics. https://metrics.torproject.org/. Accessed 13 Jan 2022
Tor Project. Chutney - The Chutney Tool for Testing and Automating Tor Network Setup. https://gitweb.torproject.org/chutney.git. Accessed 13 Jan 2022
Wacek, C., et al.: An empirical evaluation of relay selection in tor. In: NDSS (2013)
Wang, T., Goldberg, I.: Improved website fingerprinting on tor. In: WPES, pp. 201–212. ACM (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Köster, K., Marx, M., Kunstmann, A., Federrath, H. (2022). Evaluation of Circuit Lifetimes in Tor. In: Meng, W., Fischer-Hübner, S., Jensen, C.D. (eds) ICT Systems Security and Privacy Protection. SEC 2022. IFIP Advances in Information and Communication Technology, vol 648. Springer, Cham. https://doi.org/10.1007/978-3-031-06975-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-06975-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-06974-1
Online ISBN: 978-3-031-06975-8
eBook Packages: Computer ScienceComputer Science (R0)