dropping on the edge flexibility and dropping on the edge
play

Dropping on the Edge: Flexibility and Dropping on the Edge: - PowerPoint PPT Presentation

7/25/2019 PoPET s18 Dropping on the Edge: Flexibility and Dropping on the Edge: Flexibility and Trac Conrmation in Onion Routing Trac Conrmation in Onion Routing Protocols Protocols Florentin Rochet and Olivier Pereira


  1. 7/25/2019 PoPET s18 Dropping on the Edge: Flexibility and Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Tra�c Con�rmation in Onion Routing Protocols Protocols Florentin Rochet and Olivier Pereira Florentin Rochet and Olivier Pereira UCLouvain Crypto Group, Belgium Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 1/21 1

  2. Overview Overview 7/25/2019 PoPET s18 Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 2/21 2

  3. Overview Overview 7/25/2019 PoPET s18 Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 3/21 3

  4. Overview Overview 7/25/2019 PoPET s18 Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 4/21 4

  5. 7/25/2019 PoPET s18 Architectural Principle of the Internet Architectural Principle of the Internet Robustness principle (among others): Be conservative in what you do, be liberal in what you accept from others. [RFC761] [RFC1122] [RFC1958] , , Can lead to strong attacks in deployed anonymity systems Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 5/21 5

  6. 7/25/2019 PoPET s18 Forward compatibility Forward compatibility Allows compliance to future version of the protocol. static int connection_edge_process_relay_cell(cell_t *cell, ...) { ... switch(rh.command) { case RELAY_COMMAND_DROP: return 0; // do nothing. ... case RELAY_COMMAND_DATA: //process data ... return 0; ... } log_fn(LOG_PROTOCOL_WARN, LD_PROTOCOL, "Unrecognized command %d", rh.command); return 0; /* for forward compatibility, don't kill the circuit */ } Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 6/21 6

  7. 7/25/2019 PoPET s18 Outline Outline 1. Guard Discovery Attack Uses forward compatibility, a path selection trick and a side-channel 2. Dropmark attack An active traf�c con�rmation attack with interesting properties Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 7/21 7

  8. 7/25/2019 PoPET s18 Guard discovery Guard discovery Combines a path selection trick, forward compatibility and a side-channel. Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 8/21 8

  9. 7/25/2019 PoPET s18 Guard discovery Guard discovery The public report of bandwidth consumption acts as a side-channel What is the probability of success in the wild? Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 9/21 9

  10. 7/25/2019 PoPET s18 Assumptions Assumptions Consumed bandwidth of the targeted guard is always higher during the attack Silently dropped traf�c strengthens this assumption Less variance in public measurements during the attack Graceful behaviour of the relay Graceful behaviour of the relay operator Given those assumptions, we can use the history of the network to evaluate the attack Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 10/21 10

  11. 7/25/2019 PoPET s18 Let's investigate di�erent situations Let's investigate di�erent situations Onion Service's BW << Guard's BW Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 11/21 11

  12. 7/25/2019 PoPET s18 Triggering the OOM killer algorithm Triggering the OOM killer algorithm One day guard discovery attack with a bug exploit We �ll the memory of the guard relay Can trigger easily the OOM algorithm which generates a counter bug (public information) Figure: Chutney experiment triggering the OOM killer algorithm of the onion service's guard Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 12/21 12

  13. 7/25/2019 PoPET s18 Let's investigate di�erent situations Let's investigate di�erent situations Onion Service's BW >> Guard's BW Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 13/21 13

  14. 7/25/2019 PoPET s18 Evaluation Evaluation Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 14/21 14

  15. 7/25/2019 PoPET s18 Evaluation Evaluation Evaluating spare resources of guards The attack would be inne�cient if the Onion service guard is already overloaded Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 15/21 15

  16. 7/25/2019 PoPET s18 Evaluation Evaluation With the assumption that the counter exploit is �xed success rate to retrieve only one (correct) guard in a few days, against a few MB/s ≈ 96% onion service This attack cost less than a sandwich Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 16/21 16

  17. 7/25/2019 PoPET s18 Countermeasures Countermeasures Multiple suggestions to counter the guard discovery The Tor Project chose to perform a volume analysis , and to increase the bandwidth reporting interval Onion service operators: decreasing the available bandwidth reduces the risk (once the counter exploit is solved) See @mikeperry-tor/vanguards on GitHub for mitigations Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 17/21 17

  18. 7/25/2019 PoPET s18 Outline Outline 1. Guard Discovery Attack Uses forward compatibility, a path selection trick and a side-channel 2. Dropmark attack An active traf�c con�rmation attack with interesting properties Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 18/21 18

  19. 7/25/2019 PoPET s18 Dropmark attack Dropmark attack Active end-to-end correlation attack with interesting properties Does not need the victim to transfer any packet to succeed The application level traf�c does not in�uence the success rate Uses forward compatibility and a side-channel Assumes colluding exit and guard (or network observer on client-guard) Implemented and tested in Shadow with TPR and FPR ≈ 99.86% ≈ 0.03% Can be applied in many different scenarios Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 19/21 19

  20. 7/25/2019 PoPET s18 Dropmark attack Dropmark attack Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 20/21 20

  21. 7/25/2019 PoPET s18 Contributions/Conclusion Contributions/Conclusion Contributions: Identi�cation of potential weaknesses resulting from Tor's forward compatibility New guard discovery attack New traf�c con�rmation attack with intriguing properties Many more attacks out there to hunt ... Implementations and tutorial to reproduce our results available on GitHub Discussion Removing forward compatibility? Complicates the integration on novel ideas May reduce the Tor network diversity or slow down deployment of new versions Increases code complexity May not solve the problem ... Florentin R. - Dropping on the Edge: Flexibility and Tra�c Con�rmation in Onion Routing Protocols - 25th Jul 2019 file:///export/home/frochet/Documents/T or/pets18-slides/index.html?print-pdf 21/21 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend