Nomen Nescio <
nob...@dizum.com> wrote:
>The decision to lengthen a Tor chain is a matter of opinion and is
>controversial. That is fact.
>
>Grant stated a very logical, well reasoned, well written case in
>support of the possible benefits of lengthening a Tor circuit
>beyond 3 hops.
+1
BTW, it also has to be considered, that one of these three hops is the
Tor entry guard, constant for months, even retained unchanged throughout
Tor restarts, resulting in no more than two variable nodes, and granting
an adversary plenty of time to infiltrate his target's entry server.
>
>But that is his opinion. Not everyone shares that view.
>
>The Tor Project's official stance, is that is NOT recommended.
>
>It is the view of the Tor Project that increasing the number of
>hops is NOT recommended. Not only that, but it does increase
>network load
IMO that's their main concern.
> and potentially weakens anonymity.
>
>"Anonymity is not enhanced as a matter of fact. Increasing the
>number of nodes you're using to establish a circuit, if we assume
>that total number of possible relays is fixed, increases the
>possibility of picking some node controlled by an adversary."
... though getting increasingly useless for an offender with a thereby
also increased number of (hopefully) not compromized hops. Furthermore
longer chains also provide higher latency, which makes end-to-end timing
correlation analyses increasingly difficult, at least with remailer
packet transmissions of short duration. I'd only like to know whether
Tor nodes can figure out the chain length that's used.
>
>That being said, there is a Windows program called AdvOR (Advanced
>Onion Router) It's been around quite a few years.
>
>
https://sourceforge.net/projects/advtor/files/
>
>It has not been updated in a few years, but it works well.
Correct, here circuit length is set to the 3 routers standard:
| [00:00:44] [notice]
|
| Advanced Onion Router v0.3.1.5
|
| Click "Connect" to connect to the OR network.
| These are the proxy settings you can use:
| Address: 127.0.0.1
| Port: 9250
|
127.0.0.1:9250
| Use "Intercept" to be sure that your proxy settings are always used.
|
| Download locations:
|
http://www.te-home.net/?do=work&id=advor
|
http://sourceforge.net/projects/advtor/files/
|
http://www.softpedia.com/get/Internet/Servers/WEB-Servers/Advanced-TOR.shtml
| For feature requests and bug reports use one of the following forums:
|
http://www.te-home.net/?do=forum&id=advor
|
http://sourceforge.net/p/advtor/discussion/
| (no registration required: anonymous posting is allowed)
|
| [00:00:49] [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20.
| [00:00:50] [notice] We now have enough directory information to build circuits.
| [00:00:50] [notice] Bootstrapped 80%: Connecting to the Tor network.
| [00:00:52] [notice] Bootstrapped 85%: Finishing handshake with first hop.
| [00:00:52] [notice] Bootstrapped 90%: Establishing a Tor circuit.
| [00:00:53] [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
| [00:00:53] [notice] Bootstrapped 100%: Connected to the OR network..
| [00:01:04] [proxy] Connection request for
www.mixmin.net:443 .
| [00:01:05] [proxy] Connection request for
www.mixmin.net:443 .
| [00:01:06] [proxy] Connection request for
www.mixmin.net:443 .
[...]
| [00:01:10] [proxy] Connection request for
www.mixmin.net:443 .
| [00:01:11] [proxy] Connection request for
www.sec3.net:443 .
| [00:01:12] [proxy] Connection request for
www.sec3.net:443 .
| [00:01:13] [proxy] Connection request for
sec3.net:443 .
> In addition, I'm not sure if it compatible with .onion v3 addresses.
It's not:
| [00:02:04] [proxy] Connection request for gdyphuuuxv3v4o55osmruc2bypuewellgr5cgkoarks3xvwx4hlme5yd.onion:119 .
| [00:02:04] [warn] Invalid hostname gdyphuuuxv3v4o55osmruc2bypuewellgr5cgkoarks3xvwx4hlme5yd.onion; rejecting
>
>However: With AdvOR there is an option to change the circuit length
>with Tor.
With 9 hops I'm still able to (slowly) download remailer statistics:
| [00:14:33] [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20.
| [00:14:35] [notice] We now have enough directory information to build circuits.
| [00:14:35] [notice] Bootstrapped 80%: Connecting to the Tor network.
| [00:14:36] [notice] Bootstrapped 85%: Finishing handshake with first hop.
| [00:14:36] [notice] Bootstrapped 90%: Establishing a Tor circuit.
| [00:14:43] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND
| [00:14:44] [notice] Tor has successfully opened a circuit. Looks like client functionality is working.
| [00:14:44] [notice] Bootstrapped 100%: Connected to the OR network..
| [00:15:01] [proxy] Connection request for
www.mixmin.net:443 .
| [00:15:08] [proxy] Connection request for
www.mixmin.net:443 .
| [00:15:09] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND
| [00:15:16] [proxy] Connection request for
www.mixmin.net:443 .
10 nodes finally fail completely:
| [00:29:21] [notice] The Tor Directory Consensus has changed how many circuits we must track to detect network failures from 0 to 20.
| [00:29:22] [notice] We now have enough directory information to build circuits.
| [00:29:22] [notice] Bootstrapped 80%: Connecting to the Tor network.
| [00:29:23] [notice] Bootstrapped 85%: Finishing handshake with first hop.
| [00:29:24] [notice] Bootstrapped 90%: Establishing a Tor circuit.
| [00:29:31] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND
| [00:29:32] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND
| [00:29:32] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND
| [00:29:43] [warn] relay_send_command_from_edge(): Bug: Uh-oh. We're sending a RELAY_COMMAND_EXTEND cell, but we have run out of RELAY_EARLY cells on that circuit. Commands sent before: EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND,EXTEND