The Trouble with Tor (2024)

2016-03-30

  • Matthew Prince

10 min read

The Tor Project makes a browser that allows anyone to surf the Internet anonymously. Tor stands for "the onion router" and that describes how the service works. Traffic is routed through a number of relays run across the Internet where each relay only knows the next hop (because each hop is enclosed in a cryptographic envelope), not the ultimate destination, until the traffic gets to the final exit node which connects to the website — like peeling the layers of an onion.

The Trouble with Tor (2)
CC BY 2.0 image by Ben Salter

Think of it like a black box: traffic goes into the box, is bounced around between a random set of relays, and ultimately comes out to connect to the requested site. Anonymity is assured because anyone monitoring the network would have a difficult time tying the individuals making the requests going into the black box with the requests coming out.

Importance and Challenges of Anonymity

Anonymity online is important for a number of reasons we at CloudFlare believe in. For instance, Tor is instrumental in ensuring that individuals living in repressive regimes can access information that may otherwise be blocked or illegal. We believe this is so important that we offer our service for free through Project Galileo to protect politically and artistically important organizations and journalists against attacks that would otherwise censor their work.

On the other hand, anonymity is also something that provides value to online attackers. Based on data across the CloudFlare network, 94% of requests that we see across the Tor network are per se malicious. That doesn’t mean they are visiting controversial content, but instead that they are automated requests designed to harm our customers. A large percentage of the comment spam, vulnerability scanning, ad click fraud, content scraping, and login scanning comes via the Tor network. To give you some sense, based on data from Project Honey Pot, 18% of global email spam, or approximately 6.5 trillion unwanted messages per year, begin with an automated bot harvesting email addresses via the Tor network.

The Trouble with Tor (3)
CC BY 3.0 logo from the Tor Project

At CloudFlare we've not explicitly treated traffic from Tor any differently, however users of the Tor browser have been more likely to have their browsing experience interrupted by CAPTCHAs or other restrictions. This is because, like all IP addresses that connect to our network, we check the requests that they make and assign a threat score to the IP. Unfortunately, since such a high percentage of requests that are coming from the Tor network are malicious, the IPs of the Tor exit nodes often have a very high threat score.

With most browsers, we can use the reputation of the browser from other requests it’s made across our network to override the bad reputation of the IP address connecting to our network. For instance, if you visit a coffee shop that is only used by hackers, the IP of the coffee shop's WiFi may have a bad reputation. But, if we've seen your browser behave elsewhere on the Internet acting like a regular web surfer and not a hacker, then we can use your browser’s good reputation to override the bad reputation of the hacker coffee shop's IP.

The design of the Tor browser intentionally makes building a reputation for an individual browser very difficult. And that's a good thing. The promise of Tor is anonymity. Tracking a browser's behavior across requests would sacrifice that anonymity. So, while we could probably do things using super cookies or other techniques to try to get around Tor's anonymity protections, we think that would be creepy and choose not to because we believe that anonymity online is important. Unfortunately, that then means all we can rely on when a request connects to our network is the reputation of the IP and the contents of the request itself.

The Trouble with Tor (4)

Security, Anonymity, Convenience: Pick Any Two

The situation reminds me of those signs you see in diners: "fast, good, cheap (pick any two)." In our case, the three competing interests are security, anonymity, and convenience. Unfortunately, you can’t provide all three so the question is: what do you sacrifice?

Our customers sign up for CloudFlare to protect them from online attacks, so we can't sacrifice security. We also believe anonymity is critical, having witnessed first hand how repressive regimes use control of the network to restrict access to content. So that leaves sacrificing a bit of convenience for users of the Tor browser.

CAPTCHAs

Fundamentally, the challenge we have is telling automated malicious traffic sent via Tor from legitimate human users. To do that, when a visitor is coming from a Tor exit node with a poor reputation, we will often use some sort of CAPTCHA. CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart" — which is exactly what we're trying to do.

CAPTCHAs have become known for squiggly letters that you type into a box, but they could be anything that is relatively easy for real humans but hard for automated systems. Building a CAPTCHA is an extremely difficult computer science problem because there's an increasingly small number of things humans are better at than machines. We currently use Google's reCAPTCHA and recently switched from the older ‘squiggly letters’ version to the latest revision to make life easier for humans and harder for bots. We're not particularly happy with reCAPTCHA, but we haven't found an alternative that is better and can operate at our scale.

The Trouble with Tor (5)

To make sure our team understood what a pain CAPTCHAs could be, I blocklisted all the IP addresses used in Cloudflare's office so our employees would need to pass a CAPTCHA every time they wanted to visit any of our customers' sites. This dogfooding experience caused us to make some changes to make the CAPTCHAs more convenient, including convincing Google to allow us to use their new version of reCAPTCHA. It's better, but it's still less convenient than using a non-Tor browser.

We also made a change based on the experience of having to pass CAPTCHAs ourselves that treated all Tor exit IPs as part of a cluster, so if you passed a CAPTCHA for one you wouldn’t have to pass one again if your circuit changed. Over the last twelve months we’ve made incremental progress toward our goal of finding some way to provide a CAPTCHA that distinguishes automated and human traffic without being too inconvenient for the humans — but we’re not there yet.

Since the list of Tor exit nodes is public we’ve open sourced our tools used to examine the reputation and life of exit nodes. torhoney matches Tor exit nodes and information from Project Honey Pot to see which nodes are most misused and torexit can be used to determine the longevity of Tor exit nodes. We used it to tune our download of the Tor exit node list to ensure that we were up to date.

Using torhoney we produced the following chart showing the percentage of Tor exit nodes that were listed by Project Honey Pot as a comment spammer over the last year.

The Trouble with Tor (6)

As you can see the percentage is progressing steadily upwards.

Using torexit we produced the following diagram. Each column represents an individual Tor exit node and each row is a 15 minute interval. White means that the exit node was not in the exit node list during that 15 minute interval.

The Trouble with Tor (7)

As you can see most exit nodes are stable and work continuously. On the right are nodes that disappeared at some point and the slanting block of nodes on the left appear for 24 hours and then disappear (perhaps because of DHCP leases).

There are a number of problems with our current implementation and we are not satisfied with it. One is that Google themselves see significant malicious traffic from Tor so the reCAPTCHA challenges they present to Tor users are among the hardest. We're talking with Google about how we can overcome that. Another problem is that you have to pass a CAPTCHA for each site you visit. Unfortunately, to solve that, we'd need to track Tor users across sites which would sacrifice Tor’s anonymity so we’ve deemed it unacceptable.

Imperfect Solutions

So what are potential solutions? One suggestion has been that we treat GET requests for static content differently than we do more risky requests like POSTs. We actually already do treat more dangerous requests differently than less risky requests. The problem is Tor exit nodes often have very bad reputations due to all the malicious requests they send, and you can do a lot of harm just with GETs. Content scraping, ad click fraud, and vulnerability scanning are all threats our customers ask us to protect them from and all only take GET requests.

Another suggestion is that we allow our customers to allow Tor exit nodes. We resisted this for quite some time, but perhaps not for the reason you'd expect. If we provide a way to treat Tor differently by applying a rule to allow the network's IPs we couldn't think of a justifiable reason to not also provide a way to blocklist the network as well. And, while Tor users think it's a no-brainer that sites would allow their traffic, if you talk actually with site owners the majority would prefer to just block Tor traffic entirely. In fact, when we looked at our customer base, we found that far more had manually entered Tor exit node IPs to block them than to allow them. We didn’t want to make blocklisting easier because, again, we believe there’s value in the anonymous web surfing that Tor offers.

The Trouble with Tor (8)

The Trouble with Tor (9)

We relented a few weeks ago and allowed our customers to specify rules that apply to traffic from the Tor network, but we came up with a compromise to prevent the damage from full blocklisting. We now allow our customers to treat Tor the same way as we do traffic from a country (country code “T1” to be specific). Just like with countries, traffic can be allowed by anyone, but we don't allow our self-service customers to fully block traffic. Customers can force traffic to see a CAPTCHA, but they can't block traffic entirely. However, the choice of how to handle Tor is now in the hands of individual site owners.

Long Term Solutions

The long term solution has to be something that allows automated, malicious traffic to be distinguished from non-automated traffic coming through the Tor network. We see two viable ways of doing that, but we need help from the Tor Project to implement either of them.

The first would be to make it easy, or maybe even automatic, for CloudFlare customers to create a .onion version of their sites. These .onion sites are only accessible via the Tor network and therefore less likely to be targeted by automated attacks. This was Facebook’s solution when faced with the same problem. We think it’s elegant.

The problem is generating SSL certificates to encrypt traffic to the .onion sites. Tor uses hashes generated with the weak SHA-1 algorithm to generate .onion addresses and then only uses 80 bits of the 160 bits from the hash to generate the address, making them even weaker. This creates a significant security risk if you automatically generate SSL certificates. An attacker could generate a site that collides with the 80-bit .onion address and get a certificate that could be used to intercept encrypted traffic.

Because of this risk, the CA/B Forum, which regulates the issuance of SSL certificates, requires certificates for .onion addresses to be EV certificates. EV certificates require extended validation procedures which limit the risk they can be issued to a malicious party. Unfortunately, those same procedures prevent EV certificates from being issued automatically and make them prohibitively expensive for us to automatically create for all our customers.

The solution is for the Tor Project to support a stronger hashing algorithm, such as SHA256, for .onion addresses. With that in place, we believe the CA/B Forum would be open to discussing the automatic issuance of certificates. That would allow us to create .onion sites for our customers, allow Tor traffic to the .onion sites, and continue to protect our customers from automated attacks sent via the Tor network targeting their non-.onion sites.

Client-Side CAPTCHAs

Some members of CloudFlare’s team have proposed a solution to the Tor Project that moves part of the process of distinguishing between automated and human traffic to the Tor browser itself. The Tor browser could allow users to do a sort of proof-of-work problem and then send a cryptographically secure but anonymous token to services like CloudFlare in order to verify that the request is not coming from an automated system.

By moving the proof-of-work test to the client side, the Tor browser could send confirmation to every site visited so that users wouldn’t be asked to prove they are human repeatedly. Providing a way to distinguish a human using Tor from an automated bot would not only benefit traffic to CloudFlare but, if it became a standard, could also make it easier for other organizations that have restricted Tor traffic out of concern for abuse to start allowing verified-human Tor users back on their sites.

This blinded token solution is outlined in this draft.

So What’s Next?

CloudFlare is working to reduce the impact of CAPTCHAs on Tor users without in any way compromising their anonymity and without exposing our customers to additional risk. Over the coming weeks and months we will roll out changes designed to make the lives of legitimate Tor Browser users easier while keeping our customers safe.

Our mission is to help build a better Internet and that means protecting web sites from harm and ensuring that web users who wish to remain anonymous are able to do so.

We believe that the Internet will be better off if we do so as sites will not find themselves wanting to ban Tor users completely just because of abuse.

As we've done for DDoS attacks we are working to put in place technology that will filter out the bad coming from Tor while allowing the good through and we are happy to work with the Tor Project to make that a reality.

Cloudflare's connectivity cloud protects entire corporate networks, helps customers build Internet-scale applications efficiently, accelerates any website or Internet application, wards off DDoS attacks, keeps hackers at bay, and can help you on your journey to Zero Trust.

Visit 1.1.1.1 from any device to get started with our free app that makes your Internet faster and safer.

To learn more about our mission to help build a better Internet, start here. If you're looking for a new career direction, check out our open positions.

Discuss on Hacker News
TorPrivacy
The Trouble with Tor (2024)

FAQs

What is the Tor controversy? ›

Her initial analysis of the cover, in which she alleged but had not yet confirmed the use of AI-generated images, received more than 300,000 views and 35,000 likes. This is not the first time that Tor has attracted criticism online for using AI-generated assets in book cover designs.

What are the risks of using Tor? ›

People operating one of the "exit nodes" can use the device to add malware. So, any user downloading through Tor exposes the organization network to malware infection. In addition to that, it's important to know that criminals are starting to use Tor as a communication channel for malware (C&C).

Is Tor blocked in the US? ›

Tor is legal in the US. You won't likely get in trouble just because you use the Tor browser. However, Tor is not a lawless domain, so you can't use this browser for illegal activities. If you use Tor for buying drugs or weapons, you are held responsible against the law.

Is Tor even safe to use anymore? ›

Despite Tor and the dark web being closely linked, using Tor browser doesn't mean involving in illicit activities. It can be very useful software to certain internet users. Because of how it operates, Tor is generally safe to use, and Tor onion browser offer several benefits like heightened safety and privacy.

Why does Tor have a bad reputation? ›

The problem is Tor exit nodes often have very bad reputations due to all the malicious requests they send, and you can do a lot of harm just with GETs. Content scraping, ad click fraud, and vulnerability scanning are all threats our customers ask us to protect them from and all only take GET requests.

What is illegal to do on Tor? ›

Illegal activities: Cybercriminals can use Tor to stay hidden on the dark web. Dark web markets offer pirated media, hacking services, illegal drugs, compromised data, and other illicit goods and services.

Can you be traced on Tor? ›

Tor doesn't provide a new IP address when you open the browser, so anyone watching knows you're using Tor and could track your true location. It does encrypt your traffic on most nodes, but it doesn't offer encryption at the exit node. This leaves room for malicious software to creep into your system.

Can police track Tor? ›

In conclusion, while TOR can provide a high level of anonymity, it's not completely foolproof. There are ways that law enforcement and other agencies can track down users on the TOR network, such as traffic analysis, exploiting vulnerabilities in the TOR software, monitoring exit nodes and using Honeypot nodes.

Why block Tor? ›

As cybercriminals often use Tor for malicious purposes, blocking Tor traffic in an enterprise setting is advisable.

Is DuckDuckGo a Tor Browser? ›

DuckDuckGo is the default search engine in Tor Browser. DuckDuckGo does not track its users nor does it store any data about user searches. Learn more about DuckDuckGo privacy policy.

Where is Tor forbidden? ›

By curbing access to such tools, China and Iran maintain a firm grasp on their citizens' online interactions and the information they can access. Other nations that prohibit Tor are Russia, Belarus, and Turkmenistan.

Why did Russia ban Tor? ›

In early December 2021, Russia's Federal Service for Supervision of Communications, Information Technology, and Mass Media accused Tor of facilitating the dissemination of illegal content. Consequently, this inventively-named government agency has banned citizens from accessing the service.

Does Tor make you untraceable? ›

While the Tor network is designed to provide anonymity and make tracking difficult, it is not entirely untraceable. Highly skilled individuals or organizations, such as government agencies, may have the capability to de-anonymize some Tor traffic using advanced techniques.

Is anything safer than Tor? ›

One common alternative to Tor is the use of Virtual Private Networks (VPNs), which offer users a secure and private connection to the internet. Unlike Tor, which routes traffic through a series of relays, VPNs encrypt the user's internet traffic and route it through a server located in a different location.

Is Tor 100% Secure? ›

Verdict. The Tor Browser is safe, but it's not bulletproof. Your IP (Internet Protocol) address is vulnerable at the entry node, and your data is vulnerable at the exit node. Cracking both nodes and matching your IP to your data might be rare, but it's not impossible.

What is the Tor AI controversy? ›

Overview of Tor Books' 'Gothikana' Cover Controversy

The controversy intensified when it was revealed that the AI algorithm used to create the design had been trained on a limited dataset, resulting in a lack of diversity and cultural sensitivity.

What are the problems with using Tor? ›

KNOWN ISSUES
  • Tor needs your system clock (and your time zone) set to the correct time.
  • Antivirus or malware protection blocking users from accessing Tor Browser. ...
  • VPNs also tend to interfere with Tor and need to be disabled. ...
  • Videos that require Adobe Flash are unavailable. ...
  • Tor can not use a bridge if a proxy is set.

What does Tor stand for? ›

Tor is an acronym for 'The Onion Router' and has software that makes it incredibly difficult to track what you do online. It is like having a Virtual Private Network (VPN) or private browser but even more secure.

Top Articles
How To Buy Ethereum (ETH) In India Instantly | Zebpay
Luxury Solo Travel on a Budget
Northern Counties Soccer Association Nj
Skyward Sinton
Where are the Best Boxing Gyms in the UK? - JD Sports
Breaded Mushrooms
Stadium Seats Near Me
Toyota Campers For Sale Craigslist
Nyuonsite
Tlc Africa Deaths 2021
Kostenlose Games: Die besten Free to play Spiele 2024 - Update mit einem legendären Shooter
104 Presidential Ct Lafayette La 70503
Vichatter Gifs
What Is A Good Estimate For 380 Of 60
Wnem Radar
Hartford Healthcare Employee Tools
The fabulous trio of the Miller sisters
Guilford County | NCpedia
Chic Lash Boutique Highland Village
7543460065
Fool’s Paradise movie review (2023) | Roger Ebert
Ostateillustrated Com Message Boards
Diamond Piers Menards
Walmart stores in 6 states no longer provide single-use bags at checkout: Which states are next?
Average Salary in Philippines in 2024 - Timeular
Accident On May River Road Today
Zack Fairhurst Snapchat
Craigslist List Albuquerque: Your Ultimate Guide to Buying, Selling, and Finding Everything - First Republic Craigslist
The Blind Showtimes Near Amc Merchants Crossing 16
Jc Green Obits
Minnick Funeral Home West Point Nebraska
Two Babies One Fox Full Comic Pdf
Horn Rank
Malluvilla In Malayalam Movies Download
Farm Equipment Innovations
Marlene2295
100 Million Naira In Dollars
Bi State Schedule
Ridge Culver Wegmans Pharmacy
Average weekly earnings in Great Britain
Flixtor Nu Not Working
What Is Xfinity and How Is It Different from Comcast?
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Diana Lolalytics
Daily Journal Obituary Kankakee
Exploring The Whimsical World Of JellybeansBrains Only
Rage Of Harrogath Bugged
South Bend Tribune Online
2017 Ford F550 Rear Axle Nut Torque Spec
CPM Homework Help
Is My Sister Toxic Quiz
Qvc Com Blogs
Latest Posts
Article information

Author: Horacio Brakus JD

Last Updated:

Views: 6222

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Horacio Brakus JD

Birthday: 1999-08-21

Address: Apt. 524 43384 Minnie Prairie, South Edda, MA 62804

Phone: +5931039998219

Job: Sales Strategist

Hobby: Sculling, Kitesurfing, Orienteering, Painting, Computer programming, Creative writing, Scuba diving

Introduction: My name is Horacio Brakus JD, I am a lively, splendid, jolly, vivacious, vast, cheerful, agreeable person who loves writing and wants to share my knowledge and understanding with you.