Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver

Similar documents
A Modern Congestion Attack on Tor Using Long Paths

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Peer-to-Peer Systems and Security

Metrics for Security and Performance in Low-Latency Anonymity Systems

0x1A Great Papers in Computer Security

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Low-Cost Traffic Analysis of Tor

Privacy defense on the Internet. Csaba Kiraly

A SIMPLE INTRODUCTION TO TOR

CE Advanced Network Security Anonymity II

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

ENEE 459-C Computer Security. Security protocols (continued)

Onion services. Philipp Winter Nov 30, 2015

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

The New Cell-Counting-Based Against Anonymous Proxy

ENEE 459-C Computer Security. Security protocols

Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Protocols for Anonymous Communication

Anonymous communications: Crowds and Tor

CS526: Information security

ANONYMOUS CONNECTIONS AND ONION ROUTING

CNT Computer and Network Security: Privacy/Anonymity

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Anonymity in P2P Systems

The Loopix Anonymity System

CS Paul Krzyzanowski

Privacy. CS Computer Security Profs. Vern Paxson & David Wagner

anonymous routing and mix nets (Tor) Yongdae Kim

Vulnerabilities in Tor: (past,) present, future. Roger Dingledine The Tor Project

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

Tor: An Anonymizing Overlay Network for TCP

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

How Alice and Bob meet if they don t like onions

Anonymity. Assumption: If we know IP address, we know identity

Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Revisiting Circuit Clogging Attacks on Tor

CS 134 Winter Privacy and Anonymity

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Anonymous Communication: DC-nets, Crowds, Onion Routing. Simone Fischer-Hübner PETs PhD course Spring 2012

A New Replay Attack Against Anonymous Communication Networks

Dissecting Tor Bridges A Security Evaluation of their Private and Public Infrastructures

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

communication Claudia Díaz Katholieke Universiteit Leuven Dept. Electrical Engineering g ESAT/COSIC October 9, 2007 Claudia Diaz (K.U.

PrivCount: A Distributed System for Safely Measuring Tor

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

LINKING TOR CIRCUITS

Toward Improving Path Selection in Tor

Onion Routing. 1) Introduction. 2) Operations. by Harikrishnan S (M.Tech CSE) Ramji Nagariya (M.S CSE), Sai Sambhu J (M.Tech CSE).

What's the buzz about HORNET?

CS6740: Network security

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization

TorScan: Tracing Long-lived Connections and Differential Scanning Attacks

Breaking Tor Sessions with HTML5. Marco Bonetti 19 Nov 2009 DeepSec - Vienna

Host Website from Home Anonymously

Dropping on the Edge: Flexibility and Traffic Confirmation in Onion Routing Protocols

Introducing SOR: SSH-based Onion Routing

Peer-to-Peer Networks 14 Security. Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg

Low Latency Anonymity with Mix Rings

Anonymous Communication and Internet Freedom

Introduction to Traffic Analysis. George Danezis University of Cambridge, Computer Laboratory

Maintaining the Anonymity of Direct Anonymous Attestation with Subverted Platforms MIT PRIMES Computer Science Conference October 13, 2018

Analyzing the Effectiveness of Passive Correlation Attacks on the Tor Anonymity Network

Anonymous Communication and Internet Freedom

2 ND GENERATION ONION ROUTER

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

Telex Anticensorship in the

Practical Anonymity for the Masses with MorphMix

On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records

Invisible Internet Project a.k.a. I2P

MAT A Sek-13-5-a.pdf, Blatt 2 Outline TOR and the need for deanonymisation Data transformation Scoring Results Current status Software GCHQI

Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

The Onion Routing Performance using Shadowplugin-TOR

Context. Protocols for anonymity. Routing information can reveal who you are! Routing information can reveal who you are!

Design and Analysis of Efficient Anonymous Communication Protocols

Analysing Onion Routing Bachelor-Thesis

Security and Anonymity

FBI Tor Overview. Andrew Lewman January 17, 2012

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Anonymity With material from: Dave Levin

Internet Crimes Against Children:

CS232. Lecture 21: Anonymous Communications

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

Guard Sets in Tor using AS Relationships

Transcription:

Deanonymizing Tor Nathan S. Evans Nathan.S.Evans@du.edu Christian Grothoff christian@grothoff.org Colorado Research Institute for Security and Privacy University of Denver 1

Motivation Tor is probably the most popular and widely used free software P2P network used to achieve anonymity on the Internet: Tor has a strong, large user base The project is well supported Generally assumed to give users strong anonymity The news today: All the Tor nodes involved in a circuit can be discoverd, reducing Tor users level of anonymity 2

Tor General Information Tor stands for The onion router Encrypts data multiple times and is decrypted as it travels through the network a layer at a time: like peeling an onion Tor is a low latency P2P mix cascade Routes data through network along a circuit Data is encrypted as it passes through nodes (until the last hop) 3

Routing Data is forwarded through the network Each node knows only the previous hop and the next hop Only the originator knows all the hops Number of hops is hard coded (currently set to three) Key security goal: No node in the path can discover the full path 4

Routing Example Client Tor Node 1 Tor Node 2 Tor Node 3 Tor Node 4 Tor Node 5 Tor Node 6 Server Tor Node 7 Tor Node 8 Tor Node 9 Figure 1: Example showing how a normal path is chosen in the Tor network 5

Previous work Murdoch and Danezis wrote Low Cost Traffic Analysis of Tor Goal is to discover all the Tor routers involved in a given circuit Based on being able to tell the added load of one normal Tor connection Send a certain sequence down a tunnel, monitor each Tor router to see if it is involved Their attack worked well with the 2005 Tor network consisting of approximately a dozen Tor routers 6

Problems With Previous Work Less feasible with 1000+ routers Must identify all the separate routers in the circuit Attempting to measure small effects, large fluctuations that occur in actual current network give false positives We replicated their experiments, found method to be much less effective on today s network 7

Our Basis for Deanonymization Three design issues enable users to be deanonymized 1. No artificial delays induced on connections 2. Path length is set at a small finite number 3. Paths of arbitrary length through the network can be constructed Target user is running Tor with privoxy with all the default settings 8

Regular Path Example Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 2: Example showing a typical Tor circuit 9

Circular Path Example 1/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 3: Example showing how long circular routes are created 10

Circular Path Example 2/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 4: Example showing how long circular routes are created 11

Circular Path Example 3/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 5: Example showing how long circular routes are created 12

Circular Path Example 4/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 6: Example showing how long circular routes are created 13

Circular Path Example 5/5 Client Tor Node 3 Tor Node 1 Tor Node 2 Server Figure 7: Example showing how long circular routes are created 14

Client Attack Example Tor Node 1 - Unknown Node DoS Client Tor Node 3 - Our Exit Node Tor Node 2 - Known High BW Tor Node 1 Server High BW Tor Node 2 DoS Server Figure 8: Example showing a partial view of the Tor network during the attack 15

Attack Implementation Modified exit node Modified DoS node Lightweight DoS web server running on GNU libmicrohttpd Client side JavaScript for latency measurements Instrumentation client to receive data 16

Attack Implementation Exit node injects JavaScript ping code into HTML response Client browses as usual, while JavaScript continues to phone home Exit node measures variance in latency While continuing to measure, DoS attack strains possible first hop(s) If no significant variance observed, candidates and start over pick another node from Once sufficient change is observed in measurements, initial node has been found 17

120000 Gathered Data Example (1/10) Trial without stress Trial with stress Latency measurements graph 100000 Latency variance (in milliseconds) 80000 60000 40000 20000 0 0 100 200 300 400 500 600 Sample number Figure 9: Attack effects on an unused Tor node. Red line is unstressed test, green is stressed test. X axis is measurement number, Y is latency 18

40000 35000 Gathered Data Example (2/10) Control Run Attack Run Latency measurements graph Latency variance (in milliseconds) 30000 25000 20000 15000 10000 5000 0 0 100 200 300 400 500 600 Sample number Figure 10: Attack effects on a Tor node. stressed test Red line is unstressed test, green is 19

6000 Gathered Data Example (3/10) Control Run Attack Run Latency measurements graph 5000 Latency variance (in milliseconds) 4000 3000 2000 1000 0 0 100 200 300 400 500 600 Sample number Figure 11: Attack effects on a Tor node. stressed test Red line is unstressed test, green is 20

5000 4500 Gathered Data Example (4/10) Control Run Attack Run Latency measurements graph 4000 Latency variance (in milliseconds) 3500 3000 2500 2000 1500 1000 500 0 0 100 200 300 400 500 600 Sample number Figure 12: Attack effects on a Tor node. stressed test Red line is unstressed test, green is 21

90000 80000 Gathered Data Example (5/10) Trial without stress Trial with stress Latency measurements graph 70000 Latency variance (in milliseconds) 60000 50000 40000 30000 20000 10000 0 0 100 200 300 400 500 600 Sample number Figure 13: Attack effects on a Tor node. stressed test Red line is unstressed test, green is 22

Gathered Data Example (6/10) Figure 14: Histogram plot of latency times, red is unstressed trial, green is stressed. Each histogram is from the same trials as the previous set of graphs 23

Gathered Data Example (7/10) Figure 15: Histogram plot of latency times (same trials as previous graphs) 24

Gathered Data Example (8/10) Figure 16: Histogram plot of latency times (same trials as previous graphs) 25

Gathered Data Example (9/10) Figure 17: Histogram plot of latency times (same trials as previous graphs) 26

Gathered Data Example (10/10) Figure 18: Histogram plot of latency times (same trials as previous graphs) 27

What We Actually Achieve We do identify the entire path through the Tor network (same result as Murdoch and Danezis) We do achieve this on the modern, current Tor network This means that if someone were performing this attack from an exit node, Tor becomes as effective as a one-hop proxy 28

Why Our Attack is Effective Since we run the exit router, only a single node needs to be found Our multiplication of bandwidth technique allows low bandwidth connections to DoS high bandwidth connections (solves common DoS limitation) 29

Fixes Don t use a fixed path length (or at least make it longer) Don t allow infinite path lengths Induce delays into connections (probably not going to happen) Monitor exit nodes for strange behavior (been done somewhat) Disable JavaScript in clients Use end-to-end encryption 30

Attack Improvements/Variants Use meta refresh tags for measurements instead of JavaScript Parallelize testing (rule out multiple possible first nodes at once) Improved latency measures for first hop to further narrow possible first hops 31

Conclusion Current Tor implementation allows arbitrary length paths Current Tor implementation uses minimally short paths Arbitrary path lengths allow DoS DoS allows detection of significant changes in latency Significant changes in latency reveal paths used 32

Questions? 33