FINDING · DETECTION
Tor bridges that always accept incoming connections enable a three-phase 'bridge aliveness attack': an adversary collects bridge descriptors at scale, correlates bridge uptime timestamps with pseudonymous post timestamps to narrow the candidate set (winnowing), then confirms identity via circuit-clogging and timing attacks. Because bridge descriptors remain valid indefinitely and the BridgeDB rate-limits only to one descriptor set per /24 prefix per week, an adversary with botnet or open-proxy access can hoard enough bridges for the winnowing phase to succeed.
From 2011-smits-bridgespa — BridgeSPA: Improving Tor Bridges with Single Packet Authorization · §1, §1.1 · 2011 · Workshop on Privacy in the Electronic Society
Implications
- Bridge credentials must expire on a short cycle (days, not weeks) so hoarded descriptors cannot be used to build long-run uptime timelines.
- Bridge operators running the bridge on a machine they also browse from need an aliveness-hiding layer; simply being unlisted is insufficient.
Tags
Extracted by claude-sonnet-4-6 — review before relying.