guard sets for onion routing
play

guard sets for onion routing Jamie Hayes - joint work with George - PowerPoint PPT Presentation

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London j.hayes@cs.ucl.ac.uk why does tor exist? Encryption conceals the data - not the metadata. Tor attempts to hide this metadata by


  1. guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London j.hayes@cs.ucl.ac.uk

  2. why does tor exist? ∙ Encryption conceals the data - not the metadata. ∙ Tor attempts to hide this metadata by obscuring communication patterns by sending traffic through Tor relays. ∙ Low latency - trade off between usability and security. Guard Sets for Onion Routing 1/21

  3. what is tor? ∙ Thousands of volunteers relays contributing to the network. ∙ Developed in mid 2000’s - estimated 2,000,000 daily users. ∙ Used for many different reasons - whistle blowers, journalists, activists, military. Guard Sets for Onion Routing 2/21

  4. how does tor work? Entry relay Middle relay Exit relay Alice Bob Guard Sets for Onion Routing 3/21

  5. how does tor work? Entry relay Middle relay Exit relay Alice Bob Guard Sets for Onion Routing 3/21

  6. how does tor work? Entry relay Middle relay Exit relay Alice Bob Guard Sets for Onion Routing 3/21

  7. how does tor work? Entry relay Middle relay Exit relay Alice Bob Guard Sets for Onion Routing 3/21

  8. how does tor work? Entry relay Middle relay Exit relay Alice Bob Guard Sets for Onion Routing 3/21

  9. predecessor attack ∙ Connecting to the majority of the network in a short amount of time is bad. Example ∙ Adversary controls 50 out of 1000 relays. ∙ Without permanent entry relay –> pick random entry and exit in circuit - probability of both being adversary controlled is 0.25%. After 100 separate connections probability of profiling is 25%. ∙ Probability that you have been profiled increases with each connection! Guard Sets for Onion Routing 4/21

  10. what are entry guards? ∙ With permanent entry relay –> pick random entry (assume exit is adversary controlled). Chance of being profiled is 5%. ∙ Three stable relays with the guard flag that on startup Tor chooses for the client. Post 2015 three guards become one. ∙ Guards are used for 2-3 months (9 months for one guard). ∙ If a client has been unlucky and chosen an adversary guard they can ”escape” it - never rotating guards would lead to load imbalancing. ∙ Guard relays have a higher startup cost. Guard Sets for Onion Routing 5/21

  11. weaknesses client 3 Guard Sets for Onion Routing g 9 g 8 g 7 g 6 g 5 g 4 g 3 g 2 g 1 client 2 ∙ Fingerprinting attack - three client 1 users. preferable to a smaller set of bigger possible set of users is uniquely determine the user, a guards does not in itself even if the identity of the ∙ Statistical disclosure attack - but still a problem. client. Less so with one guard - guards uniquely identify a 6/21

  12. weaknesses ∙ Three guards - new guard relays underused. Bandwidth allocates a large fraction for use as a guard but only a few clients will rotate to it. ∙ Decreasing rotation period leads to more compromise but better spread of load. ∙ One guard better for load balancing - unused bandwidth used for middle and exit relay. ∙ But anonymity sizes of new guards still bad. ∙ Slow rate of rotation to new guards facilitates attacks! Guard Sets for Onion Routing 7/21

  13. what we want ∙ Instantly populate new guards - optimal spread of load. ∙ No churn. ∙ Remove possibility of unique guard history. ∙ Large sets of clients on guards. ∙ Easy in static environment but Tor is dynamic. A lot of clients and relays leave and join the network - maintaining load balance over time is difficult! Guard Sets for Onion Routing 8/21

  14. guard sets g 3 Guard Sets for Onion Routing u u u u u u u s 2 u s 1 g s g 2 ∙ Put guards and users in to sets. g 1 proposal. as compared with the single guard uniform, bandwidth to each client ∙ The provision of more, and more unavailable - less churn. when single guards are temporarily ∙ Improved reliability and security attacks. fingerprinting and disclosure ∙ Better protection against 9/21

  15. how are guard sets formed? guard set k Guard Sets for Onion Routing . . . g i . . ∙ Initially list all relays with guard . with equal bandwidth. create guard sets. We chose flags in descending order of bandwidth. ∙ Choose a threshold at which to 10/21 40MB/s, and set a deletion threshold at 20MB/s. ∙ Cycle through list splitting guards in to guard sets, creating guard sets ↑ Higher bandwidth guards g i + 1 guard set k + 1 g i + 2 g i + 3 g i + 4 ↓ Lower bandwidth guards

  16. number of guard sets throughout 2013 Rate of churn of total guard set bandwidth mirrors rate of churn of Guard Sets for Onion Routing ∙ Number of guard sets ∙ Total guard set bandwidth 11/21 guard sets. 1e7 300 1.8 total 1.6 Number of guard sets 250 1.4 1.2 Bandwidth (KB/s) 200 1.0 0.8 150 0.6 100 0.4 0.2 50 2013-01-01 2013-04-01 2013-06-30 2013-09-28 2013-12-28 0.0 2013-01-01 2013-04-01 2013-06-30 2013-09-28 2013-12-28

  17. how are assignments managed? ∙ Use a binary tree for assignments. ∙ Authority assigns guard set positions in the tree and manages guard - guard set assignments. ∙ Guard sets sit on an intermediate layer. ∙ Clients are assigned to a random leaf. ∙ Clients use the guard set associated with this leaf. Guard Sets for Onion Routing 12/21

  18. how to add a guard set to the tree . Guard Sets for Onion Routing client gs 1 gs 2 Flip fair coin at each branch until we reach a guard set, then push gs 3 . . . . 13/21 . . gs 5 . down a layer gs 4 . . . . • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

  19. how to add a guard set to the tree . Guard Sets for Onion Routing gs 1 client gs 6 gs 2 Flip fair coin at each branch until we reach a guard set, then push gs 3 . . . . 13/21 . . . . . down a layer gs 5 . . gs 4 • • • • • • • • • • • • • • • • • • • • • • • • • • • •

  20. how to remove a guard set from the tree . Guard Sets for Onion Routing client gs 1 gs 2 Choose the right most guard set (with a common ancestor) for gs 3 gs 4 . . . . 14/21 . . gs 6 . . gs 5 replacement . . . • • • • • • • • • • • • • • • • • • • • • • • • • • • •

  21. how to remove a guard set from the tree . Guard Sets for Onion Routing client gs 4 gs 2 Choose the right most guard set (with a common ancestor) for gs 3 . . . . 14/21 . . gs 6 . replacement gs 5 . . . . • • • • • • • • • • • • • • • • • • • • • • • • • • • • •

  22. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  23. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  24. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  25. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  26. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  27. how to compute guard sets How to compute and manage guard sets given a consensus document. ∙ retrieve guard set positions in tree. ∙ update needy guard sets. ∙ remove guard sets that are below deletion threshold. ∙ create new guard sets from available bandwidth. ∙ add new guard sets to tree. Guard Sets for Onion Routing 15/21

  28. binary tree remains balanced ∙ Throughout 2013 difference in guard set layers didn’t diverge. ∙ No large difference in number of clients of different guard sets. Anonymity sets are uniform. ∙ Load on guard sets is similar. Example Initialising on 1 January 2013 produces 108 guard sets, given 2.75 million users this creates 108 user sets of size 25463. By end of 2013 at worst there may exist some user sets of size 795, meaning there will always be at least 795 clients with the same guard history. Guard Sets for Onion Routing 16/21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend