Current events in Tor development. Roger Dingledine The Tor - - PowerPoint PPT Presentation

current events in tor development
SMART_READER_LITE
LIVE PREVIEW

Current events in Tor development. Roger Dingledine The Tor - - PowerPoint PPT Presentation

Current events in Tor development. Roger Dingledine The Tor Project https://torproject.org/ 1 Outline Crash course on Tor Technical (recent past) Policy / law / censorship Technical (future) Things we need help with 2


slide-1
SLIDE 1

1

Current events in Tor development.

Roger Dingledine The Tor Project https://torproject.org/

slide-2
SLIDE 2

2

Outline

  • Crash course on Tor
  • Technical (recent past)
  • Policy / law / censorship
  • Technical (future)
  • Things we need help with
slide-3
SLIDE 3

3

Tor: Big Picture

  • Freely available (Open Source), unencumbered.
  • Comes with a spec and full documentation: Dresden,

Aachen, and Yale groups implemented compatible Java Tor clients; researchers use it to study anonymity.

  • 2000 active relays, 200000+ active users, >1Gbit/s.
  • Official US 501(c)(3) nonprofit. Three full-time

developers, dozens more dedicated volunteers.

  • Funding from US DoD, Electronic Frontier

Foundation, Voice of America, ...you?

slide-4
SLIDE 4

4

Anonymity serves different interests for different user groups.

Anonymity Private citizens Governments Businesses “It's privacy!”

slide-5
SLIDE 5

5

Anonymity serves different interests for different user groups.

Anonymity Private citizens Governments Businesses “It's network security!” “It's privacy!”

slide-6
SLIDE 6

6

Anonymity serves different interests for different user groups.

Anonymity Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!”

slide-7
SLIDE 7

7

The simplest designs use a single relay to hide connections.

Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B

  • b

2 , “ Z ” ) “Y” “Z” “X”

(example: some commercial proxy providers)

slide-8
SLIDE 8

8

But a single relay is a single point of failure.

Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Evil Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B

  • b

2 , “ Z ” ) “Y” “Z” “X”

Eavesdropping the relay works too.

slide-9
SLIDE 9

9

So, add multiple relays so that no single one can betray Alice.

Bob Alice R1 R2 R3 R4 R5

slide-10
SLIDE 10

10

A corrupt first hop can tell that Alice is talking, but not to whom.

Bob Alice R1 R2 R3 R4 R5

slide-11
SLIDE 11

11

A corrupt final hop can tell that somebody is talking to Bob, but not who.

Bob Alice R1 R2 R3 R4 R5

slide-12
SLIDE 12

12

Alice makes a session key with R1 ...And then tunnels to R2...and to R3

Bob Alice R1 R2 R3 R4 R5 Bob2

slide-13
SLIDE 13

13

Outline

  • Crash course in Tor
  • Technical (recent past)
  • Policy / law / censorship
  • Technical (future)
  • Things we need help with
slide-14
SLIDE 14

14

New v3 directory protocol

  • There are two phases of directory

information: fetching the network status, and fetching all the descriptors.

  • We've changed phase one from fetching 5

network statuses (and computing the majority locally) to fetching just one consensus.

  • Still room for optimizing phase two
slide-15
SLIDE 15

15

Governments and other firewalls can just block the whole Tor network.

Alice Alice S S S S X X

slide-16
SLIDE 16

16 R4 R2 R1 R3 Bob Alice Alice Alice Alice Alice Blocked User Blocked User Blocked User Blocked User Blocked User Alice Alice Alice Alice Alice Alice Alice Alice Alice Alice

slide-17
SLIDE 17

17

“Bridge” relays

  • Encrypted directory requ

ests (over the same port as other Tor traffic)

  • Make Tor's TLS handshake look more like

Firefox+Apache

  • Integration into Vidalia
  • https://bridges.torproject.org/ or request by

unique gmail address

slide-18
SLIDE 18

18

Improved Torbutton

  • Torbutton used to just toggle your proxy

settings on and off.

  • The new version turns off cache, cookies,

plugins, doesn't leak your time zone, and blocks many other attacks

slide-19
SLIDE 19

19

Easier for users to be relays

  • Rate limit relayed traff

ic separately from your

  • wn traffic
  • Automatic IP address detection, bandwidth

estimates

  • Write limiting as well as read limiting; traffic

priorities to make the best use of available bandwidth

slide-20
SLIDE 20

20

Many good research papers in 2007

  • Nick Hopper's CCS paper on client latency attacks
  • Steven Murdoch's PET paper on sampled traffic

analysis at Internet exchanges

  • Bauer et al's WPES paper on low-resource Sybil

attacks: lying about your bandwidth, uptime, etc

  • (Tor's guard nodes are lookingly increasingly good)
  • http://freehaven.net/anonbib/ for many more!
slide-21
SLIDE 21

21

Outline

  • Crash course in Tor
  • Technical (recent past)
  • Policy / law / censorship
  • Technical (future)
  • Things we need help with
slide-22
SLIDE 22

22

Data retention

  • Remember our threat model: even one hop in

Germany may be too many

  • How many layers o

f logging are there? If your ISP logs, and its ISP logs, ...

  • How safe are these logs? Who can access them?
  • If nothing is really enforced until 2009, no need

to change technical designs immediately. But that means you need to act!

slide-23
SLIDE 23

23

Law enforcement

  • Some Tor-induced raids in Germany over the

past year(s)

  • We really need to teach law enforcement
  • fficers more about Tor -- and about Internet

security in general.

  • Please introduce me to German law

enforcement!

slide-24
SLIDE 24

24

Lawyers in Germany

  • The US's notion of “legal precedent” makes

groups like EFF worth

  • while. In Germany, it

feels like each case is on its own.

  • We need to get more European lawyers
  • involved. Meet them, teac

h them about Tor. Introduce them to each other.

  • Can we make a “German Tor Legal FAQ”?
slide-25
SLIDE 25

25

Snooping on Exit Relays

  • Lots of press lately about people watching traffic

coming out of Tor. (Ask your lawyer first...)

  • Tor hides your location; it doesn't magically

encrypt all traffic on the Internet.

  • Though Tor does protect from your local network.
  • Torflow and setting plaintext pop/imap “traps”
  • Need to educate users?
slide-26
SLIDE 26

26

File-sharing traffic

  • Theory: Tor is slow because a handful of

people are running file-sharing apps on it

  • We could traffic shape high-volume flows.

But: BitTorrent is designed to resist this.

  • We could run protocol analysis tools on the

exit relays, and snipe bad protocols

  • But: liability, neutrality
slide-27
SLIDE 27

27

Who runs the relays?

  • At the beginning, you needed to know me to

have your relay considered“verified”.

  • We've automated much of the “is it broken?”

checking.

  • Still a tension between having lots of relays

and knowing all the relay operators

slide-28
SLIDE 28

28

GeoIP reporting?

  • We'd really like to get a sense of how many

people are using the Tor network, and from where, so we can know what to focus on.

  • But it's an anonymity network!
  • Directory mirrors can see wh
  • asks for info,

but we'd like to fix that (“directory guards”)

  • Perhaps relays report aggregated dail

y stats?

slide-29
SLIDE 29

29

Problem: Abusive users get the whole network blocked.

Jerk Alice Nice Alice Tor network /. wikipedia Some IRC networks X X X

slide-30
SLIDE 30

30

Internet services: blocking (1)

  • Many admins think Tor has 6 users. If they

see 1 jerk, they conclude that Tor is stupid.

  • Right now Wikipedia blocks many many

thousands of IP addresses. And they still have problems: AOL, open proxies, Tor, ...

slide-31
SLIDE 31

31

Internet services: blocking (2)

  • Wikipedia doesn't want to introduce barriers

to contributors. But they could add speedbumps only for IPs they currently block!

  • Accounts need to prove that they're

worthwhile: manually verify the first few edits, and whitelist after that.

  • Should send the abusers back to their open

proxies, AOL, neighbor's wireless, etc

slide-32
SLIDE 32

32

Internet services: blocking (3)

  • Other options that don't require as many

changes to Wikipedia

  • Nym (Jason Holt) and Nymble (Dartmouth)

make users demonstrate a scarce resource (e.g. an IP address). Then they let websites block further edits from that user without needing to learn his IP address.

slide-33
SLIDE 33

33

Internet services: blocking (4)

  • Tor's “DNS exit list” gives an RBL-style

interface for looking up whether a given connection is from a Tor exit relay. We want to make it as easy as possible for websites to block accurately; then help them handle Tor.

  • Note that blocking connections from the Tor

network and blocking connections to the Tor network are different.

slide-34
SLIDE 34

34

Outline

  • Crash course in Tor
  • Technical (recent past)
  • Policy / law / censorship
  • Technical (future)
  • Things we need help with
slide-35
SLIDE 35

35

Relay by default

  • Vidalia should learn how to talk UPNP to

routers

  • Should auto rate limit so we don't overfill the

user's pipe?

  • How to scale the network? (Dir info size

grows with # of relays; so does # of sockets)

  • Windows networking is ... uniq

ue.

slide-36
SLIDE 36

36

Incentives to relay

  • Give people better performance if they re

lay?

  • Need to be careful – many ways to screw up

anonymity

  • Let directory authorities do audits and assign

gold stars to well-behaving relays in the directory consensus. Circuits from those relays get priority.

  • If it adds enough relays, everybody benefits.
slide-37
SLIDE 37

37

UDP Transport

  • Tor's use of TCP means relays use many

many sockets. It also means hop-by-hop congestion recovery. And we can only transport TCP.

  • DTLS now exists.
  • More research / hacking remains.
slide-38
SLIDE 38

38

Packaging

  • Tor browser bundle: Tor, Vidalia, Firefox,

Torbutton, Polipo for USB stick

  • JanusVM, Xerobank virtual machine
  • Incognito LiveCD
  • Wireless router images?
  • Firefox plugin?
slide-39
SLIDE 39

39

Better load balancing

  • Upcoming NDSS paper by Nikita Borisov and

Robin Snader on more accurate (and less gameable) bandwidth estimations.

  • Mike Perry's measurements from TorFlow
  • 3 hops vs 2 hops
slide-40
SLIDE 40

40

Outline

  • Crash course in Tor
  • Technical (recent past)
  • Policy / law / censorship
  • Technical (future)
  • Things we need help with
slide-41
SLIDE 41

41

Things we need help with (1)

  • A UPNP lib for Vidalia
  • A web-based translation interface for Qt

(Vidalia) and our web pages

  • Check out our TODO list and the

volunteer.html page

slide-42
SLIDE 42

42

Things we need help with (2)

  • More relays. More bridges. More funding.
  • Introductions to LEO in Berlin / Germany
  • Privacy advocates in Germany – and lawyers!
  • Best practices docs for using Tor with various

applications, and in various contexts

  • Google summer-of-code apps in the summer?