FINDING · EVALUATION

The architectural coupling of 'surfing' and 'serving' in Tor's bridge design—where enabling the bridge service is required to use Tor as a client—means a bridge always accepts connections whenever its operator is online, allowing a remote non-global adversary to probe a bridge's availability at negligible cost (less than 2 bps per bridge per status check via SYN/RST). Of the 247 enumerated bridges, only an average of 29.6 (just over 10%) were accessible at any given moment, providing a highly discriminating availability signal for intersection attacks.

From 2009-mclachlan-risksOn the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design · §2.2, §4.2 · 2009 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
active-probingip-blocking
defenses
bridges

Extracted by claude-sonnet-4-6 — review before relying.