FINDING · DEFENSE
COR does not solve the bootstrapping problem: a user's first connections to the COR bootstrapping network are vulnerable to the same IP-enumeration and blocking attacks as public Tor directory connections. To mitigate directory-partitioning attacks, directory retrieval is always performed through an existing COR circuit, and directories return only a random subset of available nodes rather than the full list—but this subset-delivery design is itself exploitable by a malicious directory that can fingerprint users via uniquely-assigned relay subsets.
From 2011-jones-hiding — Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing · §2.3, §3.1, §5 · 2011 · Free and Open Communications on the Internet
Implications
- Any cloud-relay scheme that relies on a public bootstrapping step inherits Tor's directory-enumeration vulnerability; initial relay discovery must use an out-of-band or unlisted channel (e.g., Tor-style private bridges, domain fronting, or a separate low-visibility bootstrapping protocol).
- Subset-based directory delivery introduces a user-fingerprinting risk; mitigate by combining it with anonymized directory access so the directory server cannot correlate the requesting IP with the subset it issued.
Tags
Extracted by claude-sonnet-4-6 — review before relying.