The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor

Abstract Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing the requisite performance guarantees that real-time applications like VoIP need. Their claims are backed by studies that may no longer be valid due to constant advancements in Tor. Moreover, we believe that these studies lacked the requisite diversity and comprehensiveness. Thus, conclusions from these studies, led them to propose novel and tailored solutions. However, no such system is available for immediate use. Additionally, operating such new systems would incur significant costs for recruiting users and volunteered relays, to provide the necessary anonymity guarantees. It thus becomes an imperative that the exact performance of VoIP over Tor be quantified and analyzed, so that the potential performance bottlenecks can be amended. We thus conducted an extensive empirical study across various in-lab and real world scenarios to shed light on VoIP performance over Tor. In over half a million calls spanning 12 months, across seven countries and covering about 6650 Tor relays, we observed that Tor supports good voice quality (Perceptual Evaluation of Speech Quality (PESQ) >3 and one-way delay <400 ms) in more than 85% of cases. Further analysis indicates that in general for most Tor relays, the contentions due to cross-traffic were low enough to support VoIP calls, that are anyways transmitted at low rates (<120 Kbps). Our findings are supported by concordant measurements using iperf that show more than the adequate available bandwidth for most cases. Hence, unlike prior efforts, our research reveals that Tor is suitable for supporting anonymous VoIP calls.

[1]  Nicholas Hopper,et al.  Shadow: Running Tor in a Box for Accurate and Efficient Experimentation , 2011, NDSS.

[2]  Nikita Borisov,et al.  EigenSpeed: secure peer-to-peer bandwidth evaluation , 2009, IPTPS.

[3]  Ahmad-Reza Sadeghi,et al.  Phonion: Practical Protection of Metadata in Telephony Networks , 2017, Proc. Priv. Enhancing Technol..

[4]  Mark Handley,et al.  SDP: Session Description Protocol , 1998, RFC.

[5]  H. Schulzrinne,et al.  A Transport Protocol for Real-time Applications , 2010 .

[6]  Antony William Rix,et al.  Perceptual evaluation of speech quality (PESQ): The new ITU standard for end-to-end speech quality a , 2002 .

[7]  Roger Dingledine,et al.  Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .

[8]  Glenn Van Wallendael,et al.  Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo quality , 2018 .

[9]  Andriy Panchenko,et al.  Performance Analysis of Anonymous Communication Channels Provided by Tor , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[10]  Maimun Rizal A Study of VoIP Performance in Anonymous Network - The Onion Routing (TOR) , 2014 .

[11]  Birgit Pfitzmann,et al.  ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.

[12]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[13]  Micah Sherr,et al.  Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor , 2019, USENIX Security Symposium.

[14]  Nikita Borisov,et al.  Improving Security and Performance in the Tor Network through Tunable Path Selection , 2011, IEEE Transactions on Dependable and Secure Computing.

[15]  Mike Perry,et al.  TorFlow: Tor Network Analysis , 2009 .

[16]  Lingfen Sun,et al.  Speech quality prediction for voice over Internet protocol networks , 2004 .

[17]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[18]  Andries P. Hekstra,et al.  Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[19]  Stefan Savage,et al.  Herd : A Scalable , Traffic Analysis Resistant Anonymity Network for VoIP Systems , 2015 .

[20]  Micah Sherr,et al.  Understanding Tor Usage with Privacy-Preserving Measurement , 2018, Internet Measurement Conference.

[21]  Irma Syarlina Hj Che Ilias,et al.  Performance analysis of audio video codecs over Wi-Fi/WiMAX network , 2014, ICUIMC '14.

[22]  Dave Levin,et al.  Ting: Measuring and Exploiting Latencies Between All Tor Nodes , 2015, Internet Measurement Conference.

[23]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[24]  Nicholas Hopper,et al.  PeerFlow: Secure Load Balancing in Tor , 2017, Proc. Priv. Enhancing Technol..

[25]  Nick Feamster,et al.  Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.

[26]  Carmela Troncoso,et al.  Drac: An Architecture for Anonymous Low-Volume Communications , 2010, Privacy Enhancing Technologies.

[27]  Günter Schäfer,et al.  Reducing call blocking rates for anonymous voice over IP communications , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).