CE Advanced Network Security Anonymity II

Similar documents
Low-Cost Traffic Analysis of Tor

0x1A Great Papers in Computer Security

A SIMPLE INTRODUCTION TO TOR

Protocols for Anonymous Communication

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols (continued)

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

Toward Improving Path Selection in Tor

CS526: Information security

anonymous routing and mix nets (Tor) Yongdae Kim

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Low-Resource Routing Attacks Against Tor

Tor: An Anonymizing Overlay Network for TCP

Internet Privacy. Markus Klein, Joshua Juen University of Illinois Fall 2011

Metrics for Security and Performance in Low-Latency Anonymity Systems

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

CS 134 Winter Privacy and Anonymity

Anonymity. Assumption: If we know IP address, we know identity

The New Cell-Counting-Based Against Anonymous Proxy

Onion services. Philipp Winter Nov 30, 2015

Anonymous communications: Crowds and Tor

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity Analysis of TOR in Omnet++

2 ND GENERATION ONION ROUTER

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

A New Replay Attack Against Anonymous Communication Networks

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

RAPTOR: Routing Attacks on Privacy in Tor. Yixin Sun. Princeton University. Acknowledgment for Slides. Joint work with

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

Tor Experimentation Tools

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

Analysis on End-to-End Node Selection Probability in Tor Network

One Fast Guard for Life (or 9 months)

Improving stream correlation attacks on anonymous networks

A Modern Congestion Attack on Tor Using Long Paths

Traffic Optimization in Anonymous Networks

Revisiting Circuit Clogging Attacks on Tor

Privacy defense on the Internet. Csaba Kiraly

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Preventing Active Timing Attacks in Low-Latency Anonymous Communication

LINKING TOR CIRCUITS

Introduction to Traffic Analysis. George Danezis University of Cambridge, Computer Laboratory

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Performance Evaluation of Tor Hidden Services

Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver

Shadow: Real Applications, Simulated Networks. Dr. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Torchestra: Reducing Interactive Traffic Delays over Tor

Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks

CS Paul Krzyzanowski

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

The Onion Routing Performance using Shadowplugin-TOR

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Anonymity in P2P Systems

Tor: Online anonymity, privacy, and security.

PrivCount: A Distributed System for Safely Measuring Tor

Pluggable Transports Roadmap

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Locating Hidden Servers

Cryptanalysis of a fair anonymity for the tor network

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

ANONYMOUS CONNECTIONS AND ONION ROUTING

An Improved Algorithm for Tor Circuit Scheduling

The Loopix Anonymity System

Personalized Pseudonyms for Servers in the Cloud. Qiuyu Xiao (UNC-Chapel Hill) Michael K. Reiter (UNC-Chapel Hill) Yinqian Zhang (Ohio State Univ.

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Analysing Onion Routing Bachelor-Thesis

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Computer Security and Privacy

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

2 Application Support via Proxies Onion Routing can be used with applications that are proxy-aware, as well as several non-proxy-aware applications, w

Practical Anonymity for the Masses with MorphMix

CRYPTOGRAPHIC PROTOCOLS: PRACTICAL REVOCATION AND KEY ROTATION

Perfect Imitation and Secure Asymmetry for Decoy Routing Systems with Slitheen. 20 June 2017 EPFL Summer Research Institute

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

CE Advanced Network Security

Computer Networks 57 (2013) Contents lists available at SciVerse ScienceDirect. Computer Networks

Protocol-level Hidden Server Discovery

Telex Anticensorship in the

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Shining Light in Dark Places: Understanding the Tor Network

Privacy SPRING 2018: GANG WANG

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Attacking Tor with covert channel based on cell counting

Core: A Peer-To-Peer Based Connectionless Onion Router

Overlay Networks. Behnam Momeni Computer Engineering Department Sharif University of Technology

Low Latency Anonymity with Mix Rings

Page 1. Goals for Today" Discussion" Example: Reliable File Transfer" CS162 Operating Systems and Systems Programming Lecture 11

Anonymity. With material from: Dave Levin and Michelle Mazurek

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication

Herbivore: An Anonymous Information Sharing System

Transcription:

CE 817 - Advanced Network Security Anonymity II Lecture 19 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained from other sources. Reference is noted on the bottom of each slide, when the content is fully obtained from another source. Otherwise a full list of references is provided on the last slide.

Tor Second-generation onion routing network http://tor.eff.org Developed by Roger Dingledine, Nick Mathewson and Paul Syverson Specifically designed for low-latency anonymous Internet communications Running since October 2003 About 420 routers in 2006 [Bauer] About 3000 in 2012 Easy-to-use client proxy Freely available, can use it for anonymous browsing [Shmatikov] 2

Tor Circuit Setup (1) Client proxy establish a symmetric session key and circuit with Onion Router #1 [Shmatikov] 3

Tor Circuit Setup (2) Client proxy extends the circuit by establishing a symmetric session key with Onion Router #2 Tunnel through Onion Router #1 (don t need ) [Shmatikov] 4

Tor Circuit Setup (3) Client proxy extends the circuit by establishing a symmetric session key with Onion Router #3 Tunnel through Onion Routers #1 and #2 [Shmatikov] 5

Using a Tor Circuit Client applications connect and communicate over the established Tor circuit Datagrams are decrypted and re-encrypted at each link [Shmatikov] 6

Tor Management Issues Many applications can share one circuit Multiple TCP streams over one anonymous connection Tor router doesn t need root privileges Encourages people to set up their own routers More participants = better anonymity for everyone Directory servers Maintain lists of active onion routers, their locations, current public keys, etc. Control how new routers join the network Directory servers keys ship with Tor code [Shmatikov] 7

The Tor design Trusted directory contains list of Tor routers User s machine preemptively creates a circuit Used for many TCP streams New circuit is created once a minute R 1 R 3 R 5 stream 1 stream 2 stream 1 srvr 1 R 2 R 4 R 6 stream 2 one minute later [Shmatikov] srvr 2 8

Creating circuits TLS encrypted TLS encrypted R 1 R 2 Create C 1 D-H key exchange K 1 K 1 Relay C 1 Extend R 2 Extend R 2 D-H key exchange K 2 K 2 [Shmatikov] 9

Once circuit is created K 1, K 2, K 3, K 4 K 1 R 1 R 2 K 2 R 3 K 3 K 4 R 4 User has shared key with each router in circuit Routers only know ID of successor and predecessor [Shmatikov] 10

Sending data R 1 R 2 K 1 K 2 Relay C 1 Begin site:80 Relay C 2 Begin site:80 TCP handshake Relay C 1 data HTTP GET Relay C 2 data HTTP GET HTTP GET Relay C 1 data resp Relay C 2 data resp resp [Shmatikov] 11

Location Hidden Servers Goal: deploy a server on the Internet that anyone can connect to without knowing where it is or who runs it Accessible from anywhere Resistant to censorship Can survive full-blown DoS attack Resistant to physical attack Can t find the physical server! [Shmatikov] 12

Creating a Location Hidden Server Server creates onion routes to introduction points Client obtains service descriptor and intro point address from directory Server gives intro points descriptors and addresses to service lookup directory [Shmatikov] 13

Using a Location Hidden Server Client creates onion route to a rendezvous point Rendezvous point mates the circuits from client & server If server chooses to talk to client, connect to rendezvous point Client sends address of the rendezvous point and any authorization, if needed, to server through intro point [Shmatikov] 14

Properties Performance: Fast connection time: circuit is pre-established Traffic encrypted with AES: no pub-key on traffic Downside: Routers must maintain state per circuit Each router can link multiple streams via CircuitID all streams in one minute interval share same CircuitID [Shmatikov] 15

Low-Cost Traffic Analysis of Tor Steven J. Murdoch, George Danezis University of Cambridge, Computer Laboratory

The holes in Tor No explicit mixing Cells are stored in separate buffers for each stream Output in a round robin fashion (for fairness and best effort service) No explicit delay, reorder, batching or drop It means the load on the Tor node affects the latency of all connection streams routed through it The higher the load, the higher the latency Streams from the same initiator use the same circuit Can be used to test whether two streams accessing two server belong to the same user [Song] 17

Attack Setup [Song] 18

Experimental Setup Probe server in U. of Cambridge Victim and corrupt server on PlanetLab Tor v0.0.9 Probe every 0.2 secs Corrupt server send data as fast as Tor allows send 10 to 25 secs Wait 30 to 75 secs Data from probing 13 Tor nodes was collected [Song] 19

Probe Result (Node K) [Song] 20

Probe Result (Node K) (no traffic pattern) [Song] 21

False Negative Node E (no significant correlation) [Song] 22

Summary of Correlation [Song] 23

Discussion Attackers can use this timing characteristic to observer without direct access to the Tor nodes Higher volumes of traffic degrade the performance of the attack [Song] 24

Variants of the Attack If no total control over the corrupt server Server is observable, take advantage of a known traffic pattern on the server Otherwise, alter the load on the server by modulating DoS attack Identify the entry point by estimating how much the induced traffic pattern is shifted as it travels through the network. [Song] 25

Low-Resource Routing Attacks Against Tor Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker, Workshop on Privacy in the Electronic Society, 2007.

Striking a Balance: Performance vs. Anonymity Two observations: Perfect anonymity is desirable, but not practical Users demand certain performance standards from any anonymous network Tor attempts to balance the traffic load to ensure a relatively low latency and high throughput service, but: What impact does this attempt at load balancing have on Tor s ability to provide strong anonymity? [Bauer] 27

Tor and Onion Routing Tor provides anonymity for TCP by tunneling traffic through a circuit of three Tor routers using a layered encryption technique Only the entry router knows the client s identity, and only the exit router knows the final destination server To easily correlate client requests to a server s response, an adversary must control the entry and exit routers for a circuit [Bauer] 28

Traditional Onion Routing Security Model Traditionally, it has been assumed that an attacker can control an entry/exit router combination for a target circuit with a very low probability: Assuming that routers are chosen uniformly at random, this probability is (c/n)^2, where the attacker controls c routers in a network of n total routers [Bauer] 29

Protecting Circuits: Entry Guards Øverlier and Syverson demonstrated that an adversary can force new circuits to be built until it controls an entry router Entry guards were introduced in May 2006 to limit the likelihood of a malicious Tor router existing at the entry position [Bauer] 30

Routing in Tor Part 1: Entry Guard Selection Tor routers advertise their own bandwidth capabilities and uptimes to the trusted directory servers Directory servers mark routers as a potential Guard if they advertise uptime and bandwidth at or above the median for all routers; only these routers may be entry guards [Bauer] 31

Routing in Tor Part 2: Non-Entry Node Selection Routers for the middle/exit positions are chosen to balance the traffic according to each node s bandwidth history; this allows for relatively low latency and high throughput service Key feature: Nodes claiming high bandwidth are chosen most frequently [Bauer] 32

Attack Model Adversary: Our attacks assume a low-bandwidth (i.e., residential cable modem) non-global passive adversary controlling n >> c > 1 malicious Tor routers Client: The clients run only as Tor proxies (default setting) and join the Tor network for the first time [Bauer] 33

Compromising Anonymity: Basic Attack Very simple: An adversary deploys c high-bandwidth ( fast ) and high-uptime ( stable ) Tor routers; under routing model, increase likelihood of controlling an entry/exit pair [Bauer] 34

Compromising Anonymity: Resource Reduction Any router can claim up to 1.5MB/s and high uptimes Currently, Tor directory servers do not verify bandwidth and uptime claims Focus malicious router s real bandwidth on accepting new clients and/or targeting specific clients or destinations [Bauer] 35

New Circuit Linking Technique Tor circuits are built deterministically; steps 1-3 must occur in order This allows circuits to be correlated before any payload data is sent Also allows for circuits to be quickly disrupted, if only one node is malicious on the circuit [Bauer] 36

Experimental Methodology We evaluated the resource-reduced attack on two isolated Tor deployments with 40 and 60 routers using Tor 0.1.1.23 (August 2006) Evaluating the bandwidth distribution from the real network provided a realistic model for the experimental deployments We generated traffic using HTTP requests from 60 (40 node network) and 90 (60 node network) clients for two hours [Bauer] 37

Malicious Router Configurations Varied the number of malicious routers (2/42, 4/44 and 3/63 and 6/66); malicious nodes advertised 1.5MB/s and large uptimes and were limited to 20KB/s Malicious routers contributed 0.3-0.8% of network s bandwidth, but advertised 22-36% of the total bandwidth Modified malicious Tor router code to prioritize circuit-building requests over data packets [Bauer] 38

Experimental Results Random Selection expectation based on (c/n)^2 The experimental results show a significant increase over the expectation if routers were chosen uniformly at random Tor s load balancing optimizations introduce opportunities to reduce the system s anonymity [Bauer] 39

Attacking Entry Guards There is currently no limit to how many routers may run on a single host Run several routers on a local machine, advertising high bandwidths and uptimes The global median uptime value will increase to that of the malicious routers Now only malicious nodes can be entry guards Resource claims must be trusted [Bauer] 40

Solutions: Raising the Bar Idea: The directory servers should monitor uptime (easy) and bandwidth (more difficult) Tor specification proposal #107: Uptime sanity checking Tor specification proposal #108: Base Stable flag on mean time between failures Idea: Limit the number of Tor routers that may be run at an IP address Tor specification proposal #109: Two routers per IP Each proposal will be implemented in a future Tor release [Bauer] 41

Acknowledgments/References [Shmatikov] CS 378 - Network Security and Privacy, Vitaly Shmatikov, University of Texas at Austin, Fall 2007. [Song] Lei Song, Michigan Tech University, summer seminars 2007. [Bauer] Presented by Kevin Bauer at Workshop on Privacy in the Electronic Society Alexandria, VA, USA, October 29, 2007 (Low-Resource Routing Attacks Against Tor, Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker, 2007) 42