Fact Sheet: Cloud Flare and the Tor Project

Similar documents
The Interactive Guide to Protecting Your Election Website

Tor: Online anonymity, privacy, and security.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization

CloudFlare Seamless IPv6 Gateway

FBI Tor Overview. Andrew Lewman January 17, 2012

Online Anonymity & Privacy. Andrew Lewman The Tor Project

Cyber Hygiene Guide. Politicians and Political Parties

Understanding, Growing, & Extending Online Anonymity

Anonymity, Usability, and Humans. Pick Two.

The Activist Guide to Secure Communication on the Internet. Introduction

Cyber Security Guide. For Politicians and Political Parties

Second International Barometer of Security in SMBs

CS Paul Krzyzanowski

crush malware that hasn't even been seen before. Alright, so not really like traditional antivirus. Cleans an already infected Mac, 14- day Premium

MARKETING VOL. 4. TITLE: Tips For Designing A Perfect Marketing Message. Author: Iris Carter-Collins

Policy recommendations. Technology fraud and online exploitation

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Hide ip address wireless network. Hide ip address wireless network.zip

360 View on M-Commerce. Presented by S. Baranikumar

IPv6 Deployment in Africa

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

MOBILE DEFEND. Powering Robust Mobile Security Solutions

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Ericsson Mobility Report

DFRI, Swedish Internet Forum 2012

Cyber Security Basics. Presented by Darrel Karbginsky

CS Final Exam

Anonymity Tor Overview

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

2012 in review: Tor and the censorship arms race. / Runa A. Sandvik /

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

Software. CPU implements "machine code" instructions. --Each machine code instruction is extremely simple. --To run, expanded to about 10 machine code

One of the most challenging tasks for today s app developers is to ensure that users are actively engaging with their app.

Windows 7 Will Not Load On My Computer Says I'm

Tor and circumvention: Lessons learned. Roger Dingledine The Tor Project

Course Outline (version 2)

An Introduction to IPv6

MailChimp Basics. A step by step guide to MailChimp Course developed by Virginia Ridley

FAQ: Privacy, Security, and Data Protection at Libraries

Kaspersky Security Network

The Guide to Best Practices in PREMIUM ONLINE VIDEO STREAMING

>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?

INTERNET SAFETY IS IMPORTANT

SURVEY ON NETWORK ATTACK DETECTION AND MITIGATION

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

The State of Hacked Accounts

An Extensive Evaluation of the Internet s Open Proxies

A Guide to Closing All Potential VDI Security Gaps

Griffith University IPv6 Guidelines. IPv6 Guidelines

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Ardmore Telephone Network TRANSPARENCY statement

Spam Protection Guide

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

TIX NZ Privacy Policy

Quad9: A Free, Secure DNS Resolver. Nishal Goburdhan Internet Infrastructure Analyst Packet Clearing House

FACEBOOK SAFETY FOR JOURNALISTS. Thanks to these partners for reviewing these safety guidelines:

The State of Mobile Advertising Q2 2012

Freedom of Access to Information and the Digital Divide: The Answer s in the Palm of your Hand. Paul Sturges Loughborough University

Privacy Dimensions to Canada's Anti-Spam Legislation (CASL)

Protecting from Attack in Office 365

BRING SPEAR PHISHING PROTECTION TO THE MASSES

Staying Safe on the Internet. Mark Schulman

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Eric Wing Digital Strategist Report for Om in the O ce

Manual Ios Update Iphone 4s Release Date Canada >>>CLICK HERE<<<

YOU CAN'T AFFORD FAKE ACCOUNTS. NOW, NEITHER CAN THE FRAUDSTERS. Fraud Report

Our Privacy Policy. Last modified: December 12th Summary of changes can be consulted at the bottom of this Privacy Policy.

SEO NEWSLETTER NOVEMBER,

THE IMPACT OF SECURITY ON APPLICATION DEVELOPMENT. August prevoty.com. August 2015

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

Ensure holiday s reach the inbox

Windows 7 Disable Changing Proxy Settings Registry


Cloudflare Advanced DDoS Protection

Last updated 31 March 2016 This document is publically available at

All-in one security for large and medium-sized businesses.

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Be certain. MessageLabs Intelligence: May 2006

Vudu app for kindle fire apk

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

OpenStack Changing the shape of Open Source Cloud Computing. Tom Fifield Community Manager, OpenStack Foundation

Broadband Internet Access Disclosure

Protection Service with Continuity

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

The Ultimate Digital Marketing Glossary (A-Z) what does it all mean? A-Z of Digital Marketing Translation

Report Course name ABSTRACT. Research and reporting. Survey Report. Nguyen Ngoc Long. Ann Viitala. Adesh Chymariya. Shu Sheng 5/2/2010.

DRAFT. Measuring KSA Broadband. Meqyas, Q Report

Fooji Code of Conduct

Tor: a brief intro. Roger Dingledine The Tor Project

Group Leader Quickstart Guide. Original photo by Trey Ratcliff

MARKETING VOL. 3

GOOGLE REVIEW SWIPE FILE

How To Stop Avg Search Appearing In New Tabs On Google Chrome

CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet

IT & DATA SECURITY BREACH PREVENTION

Cloudflare Seamless IPv6 Gateway

Transcription:

Fact Sheet: Cloud Flare and the Tor Project What is the Tor Project? The Tor Project (TorProject.org) is a non-profit organization that develops and distributes free software to help millions of people defend against online surveillance that threatens personal freedom and privacy. Tor's web browser and other privacy tools are used by human rights defenders, diplomats, government officials, and everyday people who value freedom from surveillance. The Tor browser also allows users to reach the free Internet in countries where the government restricts this access. What is CloudFlare? CloudFlare is a company that helps protect web sites from spam and other unwanted web traffic. However, as part of its services, it flags traffic from Tor users and sends CAPTCHAs to Tor users trying to reach its sites (for instance, Australia's office of Amnesty International http://www.amnesty.org.au/ )--often multiple sets of CAPTCHAs per website---or an endless loop of them. CloudFlare's Impact on Users The goal of Tor is to provide secure access to the Internet, but CloudFlare prevents Tor users from reaching important websites. It blocks some web sites completely, while in other cases it presents users with a long series of slowly loading CAPTCHAs so that the user eventually gives up. When this happens, a user may be tempted to use an unsafe browser that reveals their location or other identifying information--encouraging them to take a serious risk if they are, for instance, human rights activists or domestic violence survivors. For these groups and others, Tor provides life-saving anonymity and masks their location. Since CloudFlare makes so many websites inaccessible to Tor users, new users tend to blame themselves and believe that they are using Tor software improperly. They may then abandon using Tor altogether.

CloudFlare's impact is especially severe when Tor is being used in developing countries in which Internet speeds are slow and users pay by the minute. One at-risk human rights advocate from an East African country explains: "You think the government is interfering or someone is playing around with it. You can't keep doing CAPTCHAs and they aren't working--you think something is broken here. Doing one CAPTCHA is enough to identify if I'm human or not. [With repeated CAPTCHAs] I will run away from Tor. I won't use it. If CloudFlare really cares for security, then they should let people use Tor. Treat Tor like any other browser traffic." There is a widespread backlash against CloudFlare and frequent flare-ups on social media: CloudFlare's CAPTCHA system results in de facto censorship, since Tor users either cannot access a site or are deterred from using a site because of the obstacles presented by the CAPTCHAs. Tor users have complained that they can circumvent China's Great Fire Wall, but not CloudFlare. A 2015 report by UN Special Rapporteur David Kaye affirmed that Tor is an essential tool for freedom of expression online. Security researchers described the problem in a recent paper: "A different kind of threat...involves websites providing Tor users with degraded service, resulting in them effectively being relegated to the role of second-class citizens on the Internet." 1

The Scale of the Problem CloudFlare blocks Tor, and many other users, from accessing critical websites and seriously impedes access to websites for millions of others, including those for whom access to Tor is essential for their physical safety. Many Tor users are forced to deal with dozens of CAPTCHAs every day, and The Tor Project receives unsolicited complaints about the problem on a daily basis. CloudFlare has been aware of the problem since at least 2013. Best Practices for Companies that Want to Support Tor User Access to their Websites (List Developing) Switch to a Content Delivery Provider that supports Tor users. Whitelist access over Tor: https://support.cloudflare.com/hc/en-us/articles/203306930 Mislabeling Tor Traffic When a connection to a website travels over Tor, it will exit the network via one of the thousand exit relays set up by volunteers all over the world. The largest exit nodes transport more than 70,000 connections at a given moment. If a small number of these connections contains what CloudFlare qualifies as "malicious traffic" (spam, typically), CloudFlare will consider any subsequent connection as "malicious." Because exit relays are picked (usually at random) by the Tor client, a single bad guy could have all relays qualified as transporting "malicious traffic."

While many Tor relays appear as "malicious" from CloudFlare's point of view, the abuse is likely coming from a tiny fraction of the millions of daily Tor users. Impact on Tor Mobile (Orfox) The same issue that Tor Browser users have had with CloudFlare CAPTCHAs is present on mobile devices as well. In many developing countries, the overwhelming majority of users access the Internet via Android mobile phones. We have increasingly heard from users of Orfox, the Android version of Tor Browser, that while they find browsing the web through Tor mostly a great experience, the growing number of sites they cannot access due to CloudFlare is a deal breaker for them. They also largely blame the Orfox developers for not being able to solve the CAPTCHAs as a "bug that should be fixed." Orfox has had nearly one million installs through Google Play since it launched in the Fall of 2015. There are over 10 million installations of Orbot, Tor for Android, which can be used with Orfox, or with any app through the proxy and VPN features. This includes Facebook for Android, which directly supports Orbot through a "use with Tor" option. Monetization of Tor Users Versus non-tor Users A recent survey by CloudFlare competitor Akamai found that Tor users buy as much online as non-tor users https://www.stateoftheinternet.com/resources-cloud-security-2015-q2-websecurity-report.html CloudFlare + Tor Discussions CloudFlare has been aware of this problem for at least 3 years and Tor Project developers have engaged online and in person with CloudFlare developers for at least 18 months, but the problem of blocking Tor users has not been resolved and our users continue to suffer. Examples of Affected Websites: amnesty.org.au arabnews.com avaaz.org dailymail.co.uk plannedparenthood.org stackexchange.com medium.com

Notes on CloudFlare's Blocking by IP Address (Fact: One IP Address Does Not Equal One User) Any country, ISP, or region that has a limited number of public IPv4 addresses suffers from similar issues to Tor exit nodes. Unwanted traffic going through a single IP address can potentially block thousands or even millions of users from using CloudFlare sites. The underlying issue is CloudFlare's design assumption that an IP address represents a single user. Yet there may be millions of users behind a handful of IP addresses. CloudFlare's design discriminates against: Regions with high populations and low IPv4 address allocations. Poorer users, because recent, more secure versions of many operating systems won't run on old hardware. Less technically savvy users, who might not know how to secure their computers or run a virus scan (or solve a CAPTCHA--the required action can be difficult to decipher). Users who are visually or physically impaired. This discrimination might be unintentional, but it is very real. CloudFlare itself alludes to this on their CAPTCHA page: "If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices." This isn't practical for someone at an ISP with a large number of users. CloudFlare's design assumption only works for communities that are allocated one or more IP addresses per person. As there are 7.5 billion people in the world, and only 3.5 billion usable IPv4 addresses, some regions lose out. The US & Canada still have IPv4 addresses to give out. The Asia-Pacific ran out of IPv4 addresses in mid-2011, as did Europe in late 2013. 2 It also seems likely that African countries have very few IPv4 addresses compared with their population.

Here is a tweet from a developer testing Tor in Vietnam. He answered more than 30 sets of CAPTCHAs over three hours before accessing a website: Conclusion: CloudFlare's CAPTCHA system, which considers each IP address to be a single user, blocks access to information and hinders the right to privacy and free expression for millions of people. It puts Tor users, including human rights activists, domestic violence survivors, and others, at risk by forcing them to use unsafe computer software to reach essential websites. The Tor Project's Mission Statement: "To advance human rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding." ----- 1. Khattak, Sheharbano, et al. "Do You See What I See? Differential Treatment of Anonymous Users." Network and Distributed System Security Symposium. 2016. 2. https://en.wikipedia.org/wiki/ipv4_address_exhaustion#regional_exhaustion