At the recent Chaos Communications Congress, Steven J. Murdoch, a researcher in the security group at the University of Cambridge, discussed how clock skew can be used to facilitate a digital attack against anonymity networks. Clock skew, the tendency for a computer’s clock to become less precise when heated, can reduce the efficacy of anonymizers, such as the Electronic Frontier Foundation’s Tor network.
Murdoch explains, “When a crystal is manufactured, it has a clock skew, and it’s different for each crystal (throughout its) lifetime.” Tadayoshi Kohno, now an assistant professor in the Department of Computer Science and Engineering at the University of Washington, has shown that computers on the internet can be identified by their clock skews, by tracking the timestamps of each machine’s transmitted packets. Clock skew, however, yields up to only 64 separate identifiers, making it an incomplete confirmation tool.
Clock skew has long been a concern of engineers of synchronous network, as it causes the clock signal for system components to arrive at different times; however, Murdoch is the first to take advantage of this hardware fallibility. Murdoch attacked The Onion Router, Tor, an anonymizing network that allows unregistered users to access web sites without identifying themselves. Tor network encrypts web traffic, through multiple servers, creating layers of anonymizing packets, none of which may be decrypted by another node on the Tor network.
Murdoch tested his digital attack by setting up a Tor network server and causing the server to warm up by executing intensive processes. The increase in system temperature caused minor changes in clock skew.
Dave’s Opinion
To understand how clock skew can be used to affect the security of anonymity networks, such as Tor, I think that we must first understand how Tor works. I suggest reviewing the audio recording or transcript of Steve Gibson and Leo Laporte’s Security Now! podcast. Episode 70 of this podcast explains in clear, lucid detail how the Tor network creates anonymity for web users.
Kohno’s theoretical work and Murdoch’s proof of concept attack does not bode well for network security systems, including the GPS and other national digital assets that require precise timings to function properly.
Call for Comments
What do you think? Leave your comments below.
References
Steven J. Murdoch’s University of Cambridge website
Electronic Frontier Foundation Tor Network
Tadayoshi Kohno’s paper, Remote Physical Device Fingerprinting
Tadayoshi Kohno’s University of Washington website
Steve Gibson & Leo Laporte’s Security Now! Podcast, Achieving Internet Anonymity (episode 70)