Tor. Tor Anonymity Network. Tor Basics. Tor Basics. Free software that helps people surf on the Web anonymously and dodge censorship.

Similar documents
A SIMPLE INTRODUCTION TO TOR

0x1A Great Papers in Computer Security

Anonymous communications: Crowds and Tor

The Tor Network. Cryptography 2, Part 2, Lecture 6. Ruben Niederhagen. June 16th, / department of mathematics and computer science

THE SECOND GENERATION ONION ROUTER. Roger Dingledine Nick Mathewson Paul Syverson. -Presented by Arindam Paul

Tor: Online anonymity, privacy, and security.

CE Advanced Network Security Anonymity II

Anonymity C S A D VA N C E D S E C U R I T Y TO P I C S P R E S E N TAT I O N BY: PA N AY I OTO U M A R KO S 4 T H O F A P R I L

Challenges in building overlay networks: a case study of Tor. Steven Murdoch Principal Research Fellow University College London

You are the internet

Introduction to Tor. January 20, Secure Web Browsing and Anonymity. Tor Mumbai Meetup, Sukhbir Singh

Protocols for Anonymous Communication

CS 134 Winter Privacy and Anonymity

Onion Routing. Varun Pandey Dept. of Computer Science, Virginia Tech. CS 6204, Spring

Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. EJ Jung

Anonymous Communication and Internet Freedom

Anonymous Communication and Internet Freedom

Tor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson

Anonymity With Tor. The Onion Router. July 5, It s a series of tubes. Ted Stevens. Technische Universität München

Anonymity. Assumption: If we know IP address, we know identity

Port-Scanning Resistance in Tor Anonymity Network. Presented By: Shane Pope Dec 04, 2009

Tor Hidden Services. Roger Dingledine Free Haven Project Electronic Frontier Foundation.

Anonymity With Tor. The Onion Router. July 21, Technische Universität München

CS Paul Krzyzanowski

Tor: An Anonymizing Overlay Network for TCP

2 ND GENERATION ONION ROUTER

Network Security. Traffic analysis and anonymization. Radboud University Nijmegen, The Netherlands. Autumn 2014

Outline. Traffic multipliers. DoS against network links. Smurf broadcast ping. Distributed DoS

Onion services. Philipp Winter Nov 30, 2015

CS526: Information security

Putting the P back in VPN: An Overlay Network to Resist Traffic Analysis

Anonymity, Usability, and Humans. Pick Two.

Analysing Onion Routing Bachelor-Thesis

Circuit Fingerprinting Attack: Passive Deanonymization of Tor Hidden Services

Privacy defense on the Internet. Csaba Kiraly

OnlineAnonymity. OpenSource OpenNetwork. Communityof researchers, developers,usersand relayoperators. U.S.501(c)(3)nonpro%torganization

CS232. Lecture 21: Anonymous Communications

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Anonymity Tor Overview

Peeling Onions Understanding and using

BBC Tor Overview. Andrew Lewman March 7, Andrew Lewman () BBC Tor Overview March 7, / 1

Dark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA

PrivCount: A Distributed System for Safely Measuring Tor

Tor Networking Vulnerabilities and Breaches. Niketan Patel

Design and Implementation of Privacy-Preserving Surveillance. Aaron Segal

IP address. When you connect to another computer you send it your IP address.

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

What's the buzz about HORNET?

CS6740: Network security

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

2012 in review: Tor and the censorship arms race. / Runa A. Sandvik /

Anonymity and censorship circumvention with Tor

The Battle Against Anonymous Browsing: The Security Challenges Presented by Tor

FBI Tor Overview. Andrew Lewman January 17, 2012

Anonymous Communications

Definition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party

Stinks, CT SIGDEV JUN TOP SECRET/iCOMINT/i REL FVEY. TOP SECRET//COMINT/f REL FVEY

CNT Computer and Network Security: Privacy/Anonymity

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, autumn 2015

Anonymity Analysis of TOR in Omnet++

Tor Hidden Services How Hidden is 'Hidden'?

Vulnerabilities in Tor: (past,) present, future. Roger Dingledine The Tor Project

this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities

Metrics for Security and Performance in Low-Latency Anonymity Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Network Security: Anonymity. Tuomas Aura T Network security Aalto University, Nov-Dec 2012

Block Ciphers. Lucifer, DES, RC5, AES. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk Block Ciphers 1

Performance Evaluation of Tor Hidden Services

Hiding Amongst the Clouds

(S//REL) Open Source Multi-Hop Networks

Anonymity. With material from: Dave Levin and Michelle Mazurek

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Privacy SPRING 2018: GANG WANG

Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P

Sam Spade 1.14 Open Source Security Tool by Steve Atkins

Anonymity in P2P Systems

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

Detecting Denial of Service Attacks in Tor

Deanonymizing Tor. Colorado Research Institute for Security and Privacy. University of Denver


Trust Infrastructure of SSL

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Introduction. Overview of Tor. How Tor works. Drawback of Tor s directory server Potential solution. What is Tor? Why use Tor?

Onion Routing. Submitted By, Harikrishnan S Ramji Nagariya Sai Sambhu J


LINKING TOR CIRCUITS

Range: 10 miles. Copyright 2003 How to change frontier router ip address. All rights reserved.

anonymous routing and mix nets (Tor) Yongdae Kim

Host Website from Home Anonymously

Telex Anticensorship in the

Cryptanalysis of a fair anonymity for the tor network

Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication

1-7 Attacks on Cryptosystems

Understanding, Growing, & Extending Online Anonymity

Please ensure answers are neat and legible. Illegible answers may be given no points.

ENEE 459-C Computer Security. Security protocols

Tor and circumvention: Lessons learned. Roger Dingledine The Tor Project

Transcription:

Tor Tor Anonymity Network Free software that helps people surf on the Web anonymously and dodge censorship. CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk Initially developed at the U.S. Naval Research Laboratory (NRL), and was later open sourced for public use. As of 2015, Tor has a total user base of 2 million people, and the Tor network consists of roughly 6000 relays, mostly run by volunteers. CS470, A.A.Selçuk Tor 1 CS470, A.A.Selçuk Tor 2 Tor Basics Onion Routing: A technique that allows anonymous communication over a network of computers. Messages are routed through a circuit (a path of Tor relays), encrypted multiple times like an onion, with the enc. keys of the relays. Tor Basics When a message reaches a relay, it is decrypted once, and is forwarded towards the next relay. Since a node only knows its previous and next nodes, this assures the real source of the message stays anonymous. A circuit contains three Tor relays by default. These relays are often referred as the entry node, middleman, and exit node. CS470, A.A.Selçuk Tor 3 CS470, A.A.Selçuk Tor 4 1

Tor Basics Circuit Construction: A list of relays are obtained from a Tor directory server A random path is chosen from source to destination. Tor Basics Circuits are build incrementally, one hop at a time. At every iteration, TLS keys are negotiated between Tor relay and source. These keys are used to encrypt the data, which is sent through the SOCKS protocol. CS470, A.A.Selçuk Tor 5 CS470, A.A.Selçuk Tor 6 Hidden Services Hidden Service Setup Mechanism To let people serve a variety of services like web publishing or instant messaging without their locations getting compromised. Accessed through an onion address. (e.g. https://facebookcorewwwi.onion/) Not actual DNS names, but with the appropriate software installed, browsers can access sites with.onion addresses by sending the request through Tor. Use introduction points and rendezvous points to achieve anonymity. 3. Client obtains service descriptor and intro point address from directory 1. Server creates onion routes to introduction points 2. Server gives intro points descriptors and addresses to service lookup directory Source: http://www.cs.utexas.edu/~shmat/courses/cs380s/tor.ppt CS470, A.A.Selçuk Tor 7 CS470, A.A.Selçuk Tor 8 2

Hidden Service Setup Mechanism Possible Attacks Against Tor 4. Client creates a route to a rendezvous point 7. Rendezvous point mates the circuits from client & server 6. If server chooses to talk to client, connect to rendezvous point Passive attacks: Traffic correlation/analysis Website fingerprinting 5. Client sends the address of the rendezvous point and any authorization, if needed, to the server through an intro point Active attacks: Iterated compromise Distributing hostile code Blocking access to the Tor network Source: http://www.cs.utexas.edu/~shmat/courses/cs380s/tor.ppt CS470, A.A.Selçuk Tor 9 CS470, A.A.Selçuk Tor 10 Passive Attacks Traffic Correlation/Analysis: Since Tor is a low-latency anonymous communication system, an adversary watching the two ends (entry and exit nodes) of a circuit can correlate the traffic by examining the arrival and departure times of the packets. Traffic Correlation/Analysis Johnson et al. (CCS 2013) Chakravarty et al. (PAM 2014) Analysis shows that an adversary controlling at least two endpoint relays can de-anonymize 80-90%, with a false positive rate of 5-6%. Tor s Response: Select the entry guard nodes more carefully, and keep them longer. https://blog.torproject.org/category/tags/entryguards (good read!) Active area of research CS470, A.A.Selçuk Tor 11 CS470, A.A.Selçuk Tor 12 3

Website Fingerprinting Training a classifier by using machine learning and applying the classifier to the current data to find out which user is visiting which website. To train the classifier, packet sizes, timestamps of the packets, etc. can be used. Research (e.g., Juarez et al. (CCS 14)) indicate that Tor s size makes using website fingerprinting to identify users impossible in practice (and that they assume too much ). Active Attacks Iterated Compromise: If an adversary compromises a relay in the circuit, and then compromises the next one until all relays in the circuit become compromised, the adversary may de-cloak the user. But the adversary should complete the iteration within a life-time of a circuit. (Default life time of a circuit is 10 minutes.) CS470, A.A.Selçuk Tor 13 CS470, A.A.Selçuk Tor 14 Active Attacks Distributing Hostile Code: All Tor releases are signed by the Tor Project with an official public key; hence, the Tor users can verify the Tor release. If the attacker can somehow trick some Tor users to run a Tor-like software, he can degrade their anonymity. Active Attacks Blocking Access to the Tor Network: Mostly by governments, to prevent people reaching censored websites or resources. The Great Firewall of China (GFC) was using simple IP black-listing to block access to Tor. Users were still able to access via bridges (unpublished Tor relays). GFC then used the unique cipher list in the TLS hello message sent by the Tor clients to identify and block the Tor connection. Tor solved the problem by imitating the Firefox s cipher list in the TLS client hello. CS470, A.A.Selçuk Tor 15 CS470, A.A.Selçuk Tor 16 4

Tor Bridges Bridges are relays not listed in the main Tor directory. Since there is no public list of all bridges, even if all known Tor relays are black-listed, bridges can still be used to access the Internet via Tor. Snowden documents contain information on NSA s efforts to break Tor. Among them is a presentation, Tor Stinks. There, NSA admits they will never be able to decloak all Tor users or a specific Tor user. Nevertheless, they have some tools and techniques to spoil the Tor network. Getting three bridges from bridges.torproject.org CS470, A.A.Selçuk Tor 17 CS470, A.A.Selçuk Tor 18 Attacks against the Tor browser bundle: These attacks try to spoil Firefox s vulnerabilities. EgotisticalGiraffe exploits a vulnerability in an XML extension of Javascript. Firefox v.11.0-16.0.2 were vulnerable to this attack. FoxAcid servers Web servers designed to launch prepared attacks against visitors directed with a specific tag. By using these servers NSA aims to take control of the visitors computers. Few details are available CS470, A.A.Selçuk Tor 19 Circuit Reconstruction: By inserting high-bandwidth nodes, NSA can own all three nodes in a circuit and reveal the identities of Tor users. NSA admits that it is hard to own all the relays in a circuit, and they don t have enough nodes to apply this attack. They say that GCHQ also owns some nodes, and by working together they may be able to apply this attack. GCHQ is working on de-anonymizing Tor users too. They say they tried tracking packets in the circuits, but the method was unsuccessful. They think of applying traffic correlation attacks by owning / observing the guard node and the exit node. (next slide) CS470, A.A.Selçuk Tor 20 5

Capitalize on human error: Instead of going after Tor and its implementation, intelligence agencies mostly go after the human error. For example, in the conviction of the Silkroad (illegal market operated as a Tor hidden service) founder Ross Ulbricht, law enforcement probably used his non-anonymous moves on the Internet, like the photographs he shared on the social media. GCHQ s traffic correlation mechanism (Source: Spiegel) CS470, A.A.Selçuk Tor 21 CS470, A.A.Selçuk Tor 22 Conclusion Tor is a robust system, and its current network size makes most attacks impractical. Disclosed documents show that intelligence agencies fail to break Tor. They mostly try to de-cloak Tor users by using glitches in the browser bundle or by capitalizing on targeted people s mistakes. CS470, A.A.Selçuk Tor 23 6