FINDING · DETECTION
Using Tor exit nodes to query the bridge authority, the authors enumerated 247 bridge descriptors over two weeks (out of 1,716 active bridges during that period). An adversary running a relay advertising just 10 MBps of bandwidth would discover 63% of bridges that relay at least 40 circuits and 87% of bridges running at least 80 circuits, because all Tor clients proactively build circuits every 10 minutes.
From 2009-mclachlan-risks — On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design · §3.2 · 2009 · Workshop on Privacy in the Electronic Society
Implications
- Bridge distribution systems must classify all relaying nodes—including Tor relays, open proxies, and anonymity services—as sharing a single IP prefix, not just the requesting IP, to prevent enumeration via exit nodes.
- Require bridges to authenticate discovery queries (e.g., prove knowledge of the bridge's public-key hash over the SSL connection) so adversaries cannot confirm a host is a bridge without prior knowledge from the Bridge Authority.
Tags
Extracted by claude-sonnet-4-6 — review before relying.