THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

Similar documents
Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

2 ND GENERATION ONION ROUTER

A SIMPLE INTRODUCTION TO TOR

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Anonymity. Assumption: If we know IP address, we know identity

Anonymous communications: Crowds and Tor

Tor: An Anonymizing Overlay Network for TCP

0x1A Great Papers in Computer Security

CS526: Information security

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

CE Advanced Network Security Anonymity II

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Protocols for Anonymous Communication

Privacy defense on the Internet. Csaba Kiraly

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Tor: The Second-Generation Onion Router

ENEE 459-C Computer Security. Security protocols (continued)

Anonymity Analysis of TOR in Omnet++

ENEE 459-C Computer Security. Security protocols

Onion services. Philipp Winter Nov 30, 2015

Analysing Onion Routing Bachelor-Thesis

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

What's the buzz about HORNET?

The New Cell-Counting-Based Against Anonymous Proxy

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

ANONYMOUS CONNECTIONS AND ONION ROUTING

CS Paul Krzyzanowski

The Loopix Anonymity System

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

CS6740: Network security

CS 134 Winter Privacy and Anonymity

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Cryptanalysis of a fair anonymity for the tor network

Anonymous Connections and Onion Routing

Anonymity. With material from: Dave Levin and Michelle Mazurek

Analysis on End-to-End Node Selection Probability in Tor Network

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

anonymous routing and mix nets (Tor) Yongdae Kim

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

PrivCount: A Distributed System for Safely Measuring Tor

Your projected and optimistically projected grades should be in the grade center soon o Projected: Your current weighted score /30 * 100

Tor: Online anonymity, privacy, and security.

CS 494/594 Computer and Network Security

Real-time protocol. Chapter 16: Real-Time Communication Security

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Fall Quiz II

P 5 : A Protocol for Scalable Anonymous Communications

Introducing SOR: SSH-based Onion Routing

Achieving Privacy in Mesh Networks

Attacking Tor with covert channel based on cell counting

Performance Evaluation of Tor Hidden Services

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

How Alice and Bob meet if they don t like onions

Locating Hidden Servers

TOP SECRET//COMINT// (U//FOUO) Tor

Secure Telephony Enabled Middle-box (STEM)

Peer-to-Peer Systems and Security

A Peel of Onion. Paul Syverson U.S. Naval Research Laboratory.

A New Replay Attack Against Anonymous Communication Networks

Student ID: CS457: Computer Networking Date: 5/8/2007 Name:

Pluggable Transports Roadmap

Outline. Traffic multipliers. DoS against network links. Smurf broadcast ping. Distributed DoS

UNIT IV -- TRANSPORT LAYER

Toward Improving Path Selection in Tor

Analyzing Tor s Anonymity with Machine Learning. Sanjit Bhat, David Lu May 21 st, 2017 Mentor: Albert Kwon

DDOS - Fighting Fire with Fire Michael Walfish, Hari Balakrishnan, David Karger, and Scott Shenker.

Performance and Security Improvements for Tor: A Survey

Thinking Different. Assumptions about Operating Environments

Analyzing the Effectiveness of Passive Correlation Attacks on the Tor Anonymity Network

Tor Experimentation Tools

IP address. When you connect to another computer you send it your IP address.

A Report on Modified Onion Routing and its Proof of Concept

Low-Cost Traffic Analysis of Tor

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization

Thinking Different. Assumptions about Operating Environments. We always make assumptions about operating environments

Practical Anonymity for the Masses with MorphMix

Shadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Closed book. Closed notes. No electronic device.

Internet Protocol and Transmission Control Protocol

CNT Computer and Network Security: Privacy/Anonymity

Improving stream correlation attacks on anonymous networks

Anonymity Tor Overview

Performance and Security Improvements for Tor: A Survey

CSC 574 Computer and Network Security. TCP/IP Security

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

Tor Networking Vulnerabilities and Breaches. Niketan Patel

One Fast Guard for Life (or 9 months)

RAPTOR: Routing Attacks on Privacy in Tor. Yixin Sun. Princeton University. Acknowledgment for Slides. Joint work with

Transcription:

THE SECOND GENERATION ONION ROUTER Roger Dingledine Nick Mathewson Paul Syverson 1 -Presented by Arindam Paul

Menu Motivation: Why do we need Onion Routing? Introduction : What is TOR? Basic TOR Design Fairness, Congestion Control Hidden Services Attacks and Defense Design Decisions Limitations and Future Work Conclusion 2

What is wrong with ordinary routing? Packet headers identify recipients Packet routes can be tracked Moreover, encryption does not hide routing information So, we need anonymity of the communication channel 3

Introduction TOR is distributed overlay network designed to anonymize TCP-based applications But, why is it named after a Probably to make us cry 4

What is Onion Routing? Routing Onion is a data structure where the data is wrapped by successive layers of encryption and then each layer is decrypted like layer of an onion (there s the analogy) This makes the original text being only to sender, exit node and receiver 5

6 How Onion Routing works?

How TOR improves on Onion Routing? Perfect forward secrecy: It uses a telescoping path-building design rather than a single encrypted onion Congestion control Directory Servers Integrity checking Rendezvous points and Hidden Services 7

8 TOR DESIGN

TOR DESIGN Cells 9

E.g. of Cell Types Create: When a circuit is created from OP/OR to next OR Created: Acknowledgement for Create Relay Extend: When OP wants to extend circuit to 2 nd OR or farther Relay Extended: Acknowledgement for Relay Extend Relay Begin: To begin a relay Relay Connected : Ack for previous Relay Data : To send data down the channel 10

11

Setting up connection(s) Create c 1, E(g x1 ) Create c 2 E(g x2 ) Created c 1, g y1, H(K 1 ) Relay c 1 (Extended, g y2, H(K 2 ) Created c 2, g y2, H(K 2 ) Relay c 1 (Extend, OR 2, E(g x1 )) 12

Web page Fetching Relay c 2 (Begin Relay <Bob>) c 1 (Connected) Relay c 2 (Connected) TCP Handshake Relay c 1 (Begin <Bob>) 13

Directory Servers In traditional Onion Routing, each router floods its information to neighbors like typical link-state protocols Delays can cause inconsistent views at different parts of the network This allows attackers to exploit this lack of knowledge 14

Directory Servers TOR provides a small group of redundant well-known onion routers to track changes in topology information Each such directory server acts as an HTTP server Clients can fetch current network state ORs can periodically publish state to each server 15

16 TOR IN ACTION

17

18

19

Integrity, Fairness and Congestion Control 20

Integrity Checks Integrity checks are only done at the edges of each stream SHA-1 digest of data sent and received First 4 bytes of digest are sent with each message for verification Prevents an adversary from modifying data 21

Fairness Tor uses a token bucket approach to enforce a long-term average of incoming bytes Volunteers don t have to give up all their bandwidth to run Tor This is important as Usability is a necessity for TOR to work Interactive streams get preferential treatment 22

Congestion Control Circuit-level throttling Packaging window: how many cells the OR can package back to OP Delivery window: how many data cells can be forwarded to outside of network Stream-level throttling: Similar to above, end-to-end Also, checks for successful flushed TCP stream, and only sends send me relays when flushed under a set threshold by the user. 23

RENDEZVOUS POINTS AND HIDDEN SERVICES 24

Rendezvous Points Bob (The Server) creates onion routes to Introduction Points(IP) Bob gets Service Descriptor(which includes IP) to Alice via Lookup Server Alice obtains Service Description (IP) via Lookup Alice creates Onion route to Rendezvous Point (RP) Alice sends RP address any authorization through IP to Bob If Bob chooses to talk to Alice, connects to RP RP makes the circuit from Alice and Bob 25

26 Hidden Services via RPs

27 DESIGN DECISIONS

Choices: 28 Deployability and usability: TOR has a simple design Good usability and deployability brings more users and more anonymity TOR aims at preventing traffic analysis attacks and not, traffic confirmation attacks TOR is a low-latency system The argument is that other low-latency systems also cannot prevent traffic confirmation Security only in the intermediate channel and not against end-to-end attacks

Denial of Service Attackers can force an OR to do expensive cryptographic operations Currently no defense Suggestions: Ask clients to solve puzzles during handshaking Exit abuse ORs can be mistaken to be originators Spectrum of exit policies at nodes Open exit nodes, middleman and private 29

30 ATTACKS AND DEFENCES

ATTACKS AND DEFENCES Active Attacks Compromising Keys Run a hostile OR Passive Attacks Observing user content End-to-end timing correlation 31

ATTACKS AND DEFENCES Directory Attacks Destroy directory servers Subvert 1 or more directory servers Attacks against rendezvous points Make many introduction requests Compromise a rendezvous point 32

RESULTS, FUTURE DIRECTION & CONCULUSION 33

INITIAL RESULTS 32 nodes Small, can still experiment and change Lookup of cnn.com (normally 0.3sec) Median: 2.8 sec, 90% finished in 5.3 sec Over time, TOR has increasingly been used and have been found to scale exceedingly well 34

LIMITATIONS & FUTURE WORK How often should user rotate fresh circuits? Fixed path lengths? Further specification review: more external review of Tor Wider-scale deployment: more users for better anonymity 35

CONCLUSION Tor is great with providing anonymity,deterring replay attacks and ensuring integrity checks. For a low-latency design, TOR does quite well. Vulnerabilities to several passive and active attacks within its network leave it in need of vast improvements and research in the future. Overall, TOR succeeded in achieving its objective Onion Routing based designs can work and work really well!!! 36

37 QUESTIONS