Privacy-implications of performance-based peer selection by onion-routers: a real-world case study using I2P

  • Authors:
  • Michael Herrmann;Christian Grothoff

  • Affiliations:
  • Technische Universität München, Munich, Germany;Technische Universität München, Munich, Germany

  • Venue:
  • PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

I2P is one of the most widely used anonymizing Peer-to-Peer networks on the Internet today. Like Tor, it uses onion routing to build tunnels between peers as the basis for providing anonymous communication channels. Unlike Tor, I2P integrates a range of anonymously hosted services directly with the platform. This paper presents a new attack on the I2P Peer-to-Peer network, with the goal of determining the identity of peers that are anonymously hosting HTTP services (Eepsite) in the network. Key design choices made by I2P developers, in particular performancebased peer selection, enable a sophisticated adversary with modest resources to break key security assumptions. Our attack first obtains an estimate of the victim's view of the network. Then, the adversary selectively targets a small number of peers used by the victim with a denialof-service attack while giving the victim the opportunity to replace those peers with other peers that are controlled by the adversary. Finally, the adversary performs some simple measurements to determine the identity of the peer hosting the service. This paper provides the necessary background on I2P, gives details on the attack -- including experimental data from measurements against the actual I2P network -- and discusses possible solutions.