Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

Similar documents
The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

A SIMPLE INTRODUCTION TO TOR

Privacy defense on the Internet. Csaba Kiraly

CE Advanced Network Security Anonymity II

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

0x1A Great Papers in Computer Security

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

Anonymity Analysis of TOR in Omnet++

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Metrics for Security and Performance in Low-Latency Anonymity Systems

PrivCount: A Distributed System for Safely Measuring Tor

FBI Tor Overview. Andrew Lewman January 17, 2012

Anonymous Communications

2 ND GENERATION ONION ROUTER

Tor: Online anonymity, privacy, and security.

Onion services. Philipp Winter Nov 30, 2015

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Tor: An Anonymizing Overlay Network for TCP

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

DFRI, Swedish Internet Forum 2012

anonymous routing and mix nets (Tor) Yongdae Kim

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Practical Anonymity for the Masses with MorphMix

Protocols for Anonymous Communication

Anonymous communications: Crowds and Tor

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

How Alice and Bob meet if they don t like onions

CS November 2017

Introducing SOR: SSH-based Onion Routing

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Peeling Onions Understanding and using

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

CS November 2018

QUESTION BANK UNIT-I

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

3. (a) Explain WDMA protocol. (b) Explain wireless LAN protocol. [8+8]

Anonymity Tor Overview

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

The New Cell-Counting-Based Against Anonymous Proxy


CS526: Information security

A New Internet? RIPE76 - Marseille May Jordi Palet

Anonymous Network Concepts & Implementation

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

INF3190 A critical look at the Internet / alternative network architectures. Michael Welzl

DATA AND COMPUTER COMMUNICATIONS

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P

CS1302-COMPUTER NETWORKS UNIT I -DATA COMMUNICATION PART A

Performance Evaluation of Tor Hidden Services

IPsec NAT Transparency

System-Level Failures in Security

HTTPS--HTTP Server and Client with SSL 3.0

Network Configuration Example

It Just (Net)works. The Truth About ios' Multipeer Connectivity Framework. Alban

Overview of the Cisco Service Control Value Added Services Feature

Telex Anticensorship in the

IPsec NAT Transparency

Using HTTP/2 as a Transport for Arbitrary Bytestreams

Pluggable Transports Roadmap

Dissecting Tor Bridges A Security Evaluation of their Private and Public Infrastructures

The Cost of Push Notifications for Smartphones using Tor Hidden Services

A New Internet? Introduction to HTTP/2, QUIC and DOH

QUESTION BANK EVEN SEMESTER

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

and Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization

Advanced Network Troubleshooting Using Wireshark (Hands-on)

CompTIA Network+ Course

Network Requirements

Opportunities for Exploiting Social Awareness in Overlay Networks. Bruce Maggs Duke University Akamai Technologies

CS6740: Network security

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

Application Firewalls

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

Analysing Onion Routing Bachelor-Thesis

Tor Experimentation Tools

P2PSIP, ICE, and RTCWeb

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Internet Applications and the Application Layer Material from Kurose and Ross, Chapter 2: The Application Layer

Novell. NetWare 6. FILTER CONFIGURATION

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

CS 134 Winter Privacy and Anonymity

Hiding Amongst the Clouds

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

KINGS COLLEGE OF ENGINEERING

CS232. Lecture 21: Anonymous Communications

HTTPS--HTTP Server and Client with SSL 3.0

Advanced Security and Mobile Networks

Transcription:

Challenges in building overlay networks: a case study of Steven Murdoch Principal Research Fellow University College London

Who uses? Ordinary people e.g. to avoid unscrupulous marketers, protect children, research sensitive topics Militaries and law enforcement e.g. to protect field agents and sources, intelligence gathering, decentralise services Journalists and their audience e.g. preserve safety of journalists working in hostile regimes, resist Internet censorship

Network Topology user Entry node Middle node Exit node Network Encrypted tunnel Unencrypted TCP Web server 4

Network Topology (censored network) user Entry node Middle node Exit node! Bridge Network Encrypted tunnel Unencrypted TCP Web server 5

Network Topology (hidden services) e.g. https://facebookcorewwwi.onion/ user Rendevous point Network Encrypted tunnel Unencrypted TCP Hidden web server 6

Encryption Layered encryption prevents linking of input and output flows based on traffic content 7

Distribution of network information nodes publish their information (descriptors) to the directory authorities Directory authorities negotiate a consensus listing all available nodes, and sign under keys of all participating directory authorities Directory mirrors (most nodes) connect to directory authorities to retrieve consensus clients connect to mirrors to receive up-to-date consensus, or bootstrap by connecting to directory authority directly clients verify digital signatures on consensus

Number of relays 6000 Heartbleed 5000 4000 3000 2000 Relays Bridges 1000 0 2010 2011 2012 2013 2014 The Project https://metrics.torproject.org/ 9

Total relay bandwidth Advertised bandwidth Bandwidth history 10000 Heartbleed Bandwidth (MiB/s) 8000 6000 4000 2000 0 50% utilisation 2010 2011 2012 2013 2014 The Project https://metrics.torproject.org/ 10

Directly connecting users 5000000 Sefnit 4000000 3000000 2000000 1000000 0 2010 2011 2012 2013 2014 The Project https://metrics.torproject.org/ 11

Time in seconds to complete 5 MiB request Measured times on all sources per day Median 1st to 3rd quartile 1000 800 Heartbleed 600 400 Sefnit 200 0 2010 2011 2012 2013 2014 The Project https://metrics.torproject.org/ 12

Challenge 1: Source routing Clients choose complete path based on information in consensus Cryptography enforces that network traffic must follow the path chosen If first and last node selected is compromised then user can be de-anonymised If attacker has compromised proportion of network bandwidth p, then proportion of paths deanonymised p² (e.g. 1% of bandwidth deanonymises 0.01% of paths) 13

Peer-to-Peer anonymity networks Alternative to source-routed is peer-to-peer Clients connect to first node in the network, but do not have complete control of the path selected Advantage is that load balancing is easier and clients don t need to know full network Disadvantage is route-capture: first malicious node will only route to other malicious nodes If attacker has compromised proportion of network bandwidth p, then proportion of paths deanonymised p (e.g. 1% of bandwidth deanonymises 1% of paths) 14

Managing consequences of source-routing Source routing brings advantages, but has costs Clients must know of all nodes Consensus means that only one directory authority is contacted Mini-descriptors reduce size of information downloaded and diff s have been proposed Clients are provided enough information to loadbalance correctly, through probing nodes and adjusting probability of selection Still a problem for network growth 15

Challenge 2: congestion control network is perpetually congested ~50% utilisation on average IP networks normally 3 5% nodes cannot drop packets when congested Counter-mode encryption used Links between nodes use TCP, so take advantage of TCP congestion control Down-side is head of line blocking End-to-end congestion control achieved through implementing sliding windows 16

Potential changes in congestion control Replace TCP with UDP and bring congestion control explicitly into Also avoids problem of limited number of TCP sockets Use latency-based congestion control (LEDBAT/ µtp) to back off before packet loss When multiplexing different circuits on one link, don t block all circuits when there s packet loss on only one Also needs new crypto (DTLS?) 17

over TLS/TCP (current) Application Initiator Intermediate Exit Server Gateway Gateway Stream Stream Cell Auth Cell Auth HTTP Circuit Circuit Circuit SOCKS TLS TLS TLS HTTP TCP Host TCP TCP TCP TCP IP IP IP IP IP over µtp/dtls/udp (potential change) Gateway Gateway Stream Stream Cell Auth Cell Auth Circuit Circuit Circuit HTTP utcp utcp utcp SOCKS DTLS DTLS DTLS HTTP TCP Host TCP UDP UDP UDP TCP IP IP IP IP IP 18

Challenge 3: Clique topology Any node can (almost) be at any position in a path selected by a client TCP links are kept up unless idle As a result any node must be able to connect to any other node, and many nodes will stay connected to almost every other node Problems include nodes in censored countries are not useful IPv6 only nodes cannot be used Not optimal for mixing traffic of different users 19

Alternative topologies: clique O(n²) links may be at different stage of different paths 20

Alternative topologies: cascade O(n) links Easy to trace traffic 21

Alternative topologies: stratified O(n²) links, but less than clique always at same point in every path Optimal design, for some reasonable metrics approximately does this already 22

What is needed next More bandwidth (both exit and middle) More development effort on and surrounding projects, e.g. Censorship resistance Safe user experience (browser, chat, mail) Principles and tools for scaling, enhancing performance and security of source-routed overlay networks Techniques for safely measuring networks and rolling out significant design changes 23