
Template:Persistent Tor Entry Guards Introduction
What are Tor Entry Guards? If this is an unfamiliar term, please press on Expand on the right.
Many well known enhanced anonymity designs such as Tor, Whonix and the Tor Browser Bundle (TBB) use persistent Tor guards. This decision is attributable to community-based research which demonstrates that persistent Tor entry guards benefit security and lower the probability of an adversary profiling a user. [3]
In general, users should not interfere with Tor guard persistence or the natural rotation of entry guards every few months. At the time of writing, the Tor client selects one guard node, but previously used a three-guard design. Guards have a primary lifetime of 120 days. [4] [5] [6]
Guard Fingerprinting
While natural guard rotation is recommended, there are some corner cases in which an adversary could fingerprint the entry guards [7] and de-anonymize a user. For instance:
- The same entry guards are used across various physical locations and access points.
- The same entry guards are used after permanently moving to a different physical location.
For details on how this is possible, press Expand on the right.
There are several ways to mitigate the risk of guard fingerprinting across different physical locations. In most cases, the original entry guards can also be re-established after returning home:
- Clone Kicksecure (kicksecure) with New Entry Guards.
- Regenerate the Tor State File after Saving the Current Tor State.
- Configure Tor to use Alternating Bridges.
- If moving to a new location permanently, create Fresh Tor Entry Guards by Regenerating the Tor State File.
Forum discussion:
https://forums.whonix.org/t/persistent-tor-entry-guard-relays-can-make-you-trackable-across-different-physical-locations/2090
- ↑ Even though the attacker can't discover the user's destinations in the network, they still might target a list of known Tor users.
- ↑
Source:
torproject.org What are Entry Guards?
license:
Content on this site is Copyright The Tor Project, Inc.. Reproduction of content is permitted under a Creative Commons Attribution 3.0 United States License. All use under such license must be accompanied by a clear and prominent attribution that identifies The Tor Project, Inc. as the owner and originator of such content. The Tor Project Inc. reserves the right to change licenses and permissions at any time in its sole discretion.
- ↑ The risk of guard fingerprinting is less severe now that upstream (The Tor Project) has changed its guard parameters to decrease the de-anonymization risk.
- ↑ Prop 291 indicates a 3.5 month guard rotation.
- ↑ The Tor Project is currently considering shifting to two guards per client for better anonymity, instead of having one primary guard in use.
- ↑ https://github.com/torproject/torspec/blob/master/proposals/291-two-guard-nodes.txt
- ↑ The entropy associated with one, two or three guards
is 9, 17 and 25 bits, respectively.
- ↑ https://metrics.torproject.org/relayflags.html