Skip to main content

Towards Flexible Anonymous Networks

Abstract
Anonymous Communication designs such as Tor build their security on distributed trust over many volunteers running relays in diverse global locations. In practice, this distribution leads to a heterogeneous network in which many versions of the Tor software co-exist, each with differing sets of protocol features. Because of this heterogeneity, Tor developers employ forward-compatible protocol design as a strategy to maintain network extensibility. This strategy aims to guarantee that different versions of the Tor software interact without unrecoverable errors. In this work, we cast protocol tolerance that is enabled by forward-compatible protocol considerations as a fundamental security issue. We argue that, while being beneficial for the developers, protocol tolerance has resulted in a number of strong attacks against Tor in the past fifteen years.

To address this issue, we propose Flexible Anonymous Network (FAN), a new software architecture for volunteer-based distributed networks that shifts the dependence away from protocol tolerance without losing the ability for developers to ensure the continuous evolution of their software. We i) instantiate an implementation, ii) evaluate its overheads and, iii) experiment with several of FAN’s benefits to defend against a severe attack still applicable to Tor today.

Reference
Rochet, F., Dejaeghere, J., & Elahi, T. (2024). Towards Flexible Anonymous Networks. In Proceedings of the 23rd Workshop on Privacy in the Electronic Society (WPES '24) ACM Press. https://doi.org/10.1145/3689943.3695038

Author(s)

Digital Object Identifier (DOI)
https://doi.org/10.1145/3689943.3695038
Author(s) not member of CyberExcellence
Florentin Rochet
Jules Dejaeghere
Tariq Elahi