The Once and Future Onion

  • Paul Syverson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10492)


Onionsites are Internet sites accessed via protocols offering security protections beyond those provided by the usual protocols and infrastructure of the Internet, such as confidentiality of address lookup, and that significantly strengthen commonly offered protections; for example, their self-authenticating addresses preclude the kinds of certificate hijacks that have occurred against registered domain names. I will sketch the properties and design of onion services, including early history as well as recent developments. I will also describe integration of onionsites much more fully into conventional Internet sites in ways that promote their general widescale adoption.



More people have helped shape the work and ideas I have described above than could be acknowledged here. Specific thanks to Richard Barnes for conversations that led to the ideas for subdomain onions, and to Matt Traudt and Ryan Wails for helpful comments on a draft of this paper.


  1. 1.
    Anderson, R.: The eternity service. In: 1st International Conference on the Theory and Applications of Cryptology (Pragocrypt 1996), pp. 242–252. Czech Technical University Publishing House, Prague, Czech Republic, September/October 1996Google Scholar
  2. 2.
    Appelbaum, J., Muffett, A.: The .onion special-use domain name (2015).
  3. 3.
    Biryukov, A., Pustogarov, I., Weinmann, R.P.: Trawling for Tor hidden services: detection, measurement, deanonymization. In: IEEE Symposium on Security and Privacy (SP) (2013)Google Scholar
  4. 4.
    Brown, T.W., Brooks, J., Johnson, A., Jansen, R., Kadianakis, G., Syverson, P., Dingledine, R.: Rendezvous single onion services, Tor proposal 252 (2015).
  5. 5.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004Google Scholar
  6. 6.
    Goldberg, I., Wagner, D.: TAZ servers and the Rewebber network: enabling anonymous publishing on the World Wide Web. First Monday 3(4) (1998)Google Scholar
  7. 7.
    Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996). doi: 10.1007/3-540-61996-8_37 CrossRefGoogle Scholar
  8. 8.
    Goulet, D., Johnson, A., Kadianakis, G., Loesing, K.: Hidden-service statistics reported by relays. Tor Technical report 2015–04-001, The Tor Project, April 2015Google Scholar
  9. 9.
    Goulet, D., Kadianakis, G.: Random number generation during Tor voting, (Tor proposal 250) (2015).
  10. 10.
  11. 11.
    Jansen, R., Johnson, A.: Safely measuring Tor. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS 2016) (2016)Google Scholar
  12. 12.
    Jansen, R., Tschorsch, F., Johnson, A., Scheuermann, B.: The sniper attack: anonymously deanonymizing and disabling the Tor network. In: Proceedings of the Network and Distributed Security Symposium - NDSS 2014. IEEE, February 2014Google Scholar
  13. 13.
    Kadianakis, G., Perry, M.: Defending against guard discovery attacks using vanguards, (Tor proposal 247) (2015).
  14. 14.
    Mathewson, N.: Next-generation hidden services in Tor (Tor proposal 224).
  15. 15.
    Muffett, A.: How to get a company or organisation to implement an onion site, i.e. a Tor hidden service, October 2015.
  16. 16.
  17. 17.
  18. 18.
  19. 19.
    Øverlier, L., Syverson, P.: Locating hidden servers. In: 2006 IEEE Symposium on Security and Privacy (S & P 2006), Proceedings, pp. 100–114. IEEE CS, May 2006Google Scholar
  20. 20.
    Øverlier, L., Syverson, P.: Valet services: improving hidden servers with a personal touch. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 223–244. Springer, Heidelberg (2006). doi: 10.1007/11957454_13 CrossRefGoogle Scholar
  21. 21.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Proxies for anonymous routing. In: Twelfth Annual Computer Security Applications Conference, pp. 95–104. IEEE CS Press (1996)Google Scholar
  22. 22.
    Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Protocols using anonymous connections: mobile applications. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 13–23. Springer, Heidelberg (1998). doi: 10.1007/BFb0028156 CrossRefGoogle Scholar
  23. 23.
  24. 24.
  25. 25.
  26. 26.
  27. 27.
  28. 28.
    The Tor Project.
  29. 29.
    Victors, J., Li, M., Fu, X.: The onion name system: Tor-powered decentralized DNS for Tor onion services. Proc. Priv. Enhancing Technol. 2017(1), 21–41 (2017)Google Scholar
  30. 30.
    Waldmen, M., Rubin, A.D., Cranor, L.F.: Publius: A robust, tamper-evident, censorship-resistant web publishing system. In: Proceedings of the 9th USENIX Security Symposium, August 2000Google Scholar

Copyright information

© US Government 2017

Authors and Affiliations

  1. 1.U.S. Naval Research LaboratoryWashington, DCUSA

Personalised recommendations