Discussion:
[tor-dev] routing security handling in the tor network
nusenu
2018-08-21 07:36:00 UTC
Permalink
Hi,

I looked at the routing security state
of the >3k BGP prefixes that make up the tor network [1].

I believe it is important for tor to have a discussion on how
the network should deal with relays that will increasingly be only partially reachable
due to the increase of RPKI route origin validation (ROV) in big IXPs (AMS-IX to name one).
“Virtual” Route Origin Validation in the Tor Context
The are two good reasons why Tor should care about relays located in
It will eventually break the “the Tor network is a full mesh”
assumption. Relays in such RPKI ‘invalid’ prefixes with no
alternative valid route will not be reachable from ASes performing
ROV, but the Tor network assumes that every relay can reach every
other relay. When ROV breaks that assumption it is better to exclude
these relays than to keep only partially reachable relays. An RPKI
‘Invalid’ route might as well be an actual BGP hijacking attempt and
why not stop that?
The obvious place to enforce ROV for the Tor network would be the Tor
directory authorities that would run RPKI validators and vote for
relays accordingly. At this point this is no more than an idea.
There are certainly some challenges and trade-offs when doing ROV from a
non-BGP-router perspective, but they are solvable.

There is no need to panic - this affects less than 5 relays currently but
we should have a discussion and reach some form of consensus on the topic
to move forward instead of waiting until it significantly affects reachability.

Would be nice to have an initial discussion even before writing a proposal to
gather opinions if that would be actually worth doing.

kind regards,
nusenu

[1] https://medium.com/@nusenu/how-vulnerable-is-the-tor-network-to-bgp-hijacking-attacks-56d3b2ebfd92
--
https://twitter.com/nusenu_
https://mastodon.social/@nusenu
nusenu
2018-08-27 11:42:00 UTC
Permalink
to underline the relevance of this:

one of the most important IP blocks (185.222.100.0/22) on the internet
with regards to Tor created route origin authorizations (ROAs)
for their prefixes. These prefixes are use by 3 major exit operators
(including the biggest exit operator).

they make up >15% of the Tor network's exit capacity,
which means that we are around 50% RPKI ROA coverage for Tor exit capacity now.
--
https://twitter.com/nusenu_
https://mastodon.social/@nusenu
Loading...