SLIDE 1 1
T h e T
P r
e c t
Our mission is to advance human rights and freedoms by creating and deploying free and open privacy and anonymity technologies, supporting their unrestricted availability and use, and furthering their scientifjc and popular understanding.
SLIDE 2
2
SLIDE 3
n l i n e A n
y mi t y
– O
p e n S
r c e
– O
p e n N e t w
k
n i t y
r e s e a r c h e r s , d e v e l
e r s , u s e r s a n d r e l a y
e r a t
s .
. S . 5 1 ( c ) ( 3 ) n
r
t
g a n i z a t i
SLIDE 4
4
Estimated 2,000,000+ daily Tor users
SLIDE 5
5
Threat model: what can the attacker do?
Alice Anonymity network Bob watch (or be!) Bob! watch Alice! Control part of the network!
SLIDE 6
6
Anonymity isn't encryption: Encryption just protects contents.
Alice Bob “Hi, Bob!” “Hi, Bob!” <gibberish> attacker
SLIDE 7
7
Privacy by promise, privacy by design
“You can't prove it was me!” “Promise you won't look!” “Promise you won't remember!” “Promise you won't tell!” “I didn't write my name on it!” “Isn't the Internet already anonymous?”
SLIDE 8
8
Anonymity serves different interests for different user groups.
Anonymity
Private citizens “It's privacy!”
SLIDE 9
9
Anonymity serves different interests for different user groups.
Anonymity
Private citizens Businesses “It's network security!” “It's privacy!”
SLIDE 10
10
Anonymity serves different interests for different user groups.
Anonymity
Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!”
SLIDE 11
11
Anonymity serves different interests for different user groups.
Anonymity
Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!” Human rights activists “It's reachability!”
SLIDE 12
12
Current situation: Bad people on the Internet are doing fine
Trojans Viruses Exploits Phishing Spam Botnets Zombies Espionage DDoS Extortion
SLIDE 13 13
The simplest designs use a single relay to hide connections.
Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B
2 , “ Z ” ) “Y” “Z” “X”
(example: some commercial proxy providers)
SLIDE 14 14
But a single relay (or eavesdropper!) is a single point of failure.
Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Evil Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B
2 , “ Z ” ) “Y” “Z” “X”
SLIDE 15 15
... or a single point of bypass.
Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Irrelevant Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B
2 , “ Z ” ) “Y” “Z” “X”
Timing analysis bridges all connections through relay ⇒ An attractive fat target
SLIDE 16
16
So, add multiple relays so that no single one can betray Alice.
Bob Alice R1 R2 R3 R4 R5
SLIDE 17
17
Alice makes a session key with R1 ...And then tunnels to R2...and to R3
Bob Alice R1 R2 R3 R4 R5 Bob2
SLIDE 18
18
SLIDE 19 19
Tor's safety comes from diversity
- #1: Diversity of relays. The more relays
we have and the more diverse they are, the fewer attackers are in a position to do traffic confirmation. (Research problem: measuring diversity over time)
- #2: Diversity of users and reasons to use
- it. 50000 users in Iran means almost all of
them are normal citizens.
SLIDE 20
20
SLIDE 21
21
Orbot
SLIDE 22
22
Tails LiveCD
SLIDE 23
23
SLIDE 24
24
SLIDE 25
25
Pluggable transports
SLIDE 26 26
Pluggable transports
- Flashproxy (Stanford), websocket
- FTEProxy (Portland St), http via regex
- Stegotorus (SRI/CMU), http
- Skypemorph (Waterloo), Skype video
- uProxy (Google), webrtc
- Lantern (BNS), social network based
- ScrambleSuit (Karlstad), obfs-based
- Telex (Michigan/Waterloo), traffic divert
SLIDE 27 27
O n i
S e r v i c e
SLIDE 28 28
H i d d e n S e r v i c e s
h e “ .
i
” a d d r e s s e s
– 1
6 c h a r a c t e r s l
g ( b a s e 3 2 )
– E
. g : n z h 3 f v 6 j c 6 j s k k i 3 .
i
l i e n t a n d S e r v e r h i d e t h e i r l
a t i
a n b e u s e d f
v a r i
s k i n d s
T C P t r a ffjc
v e r y t h i n g s t a y s i n s i d e t h e T
n e t w
k
SLIDE 29
29
SLIDE 30
30
SLIDE 31
31
SLIDE 32
32
SLIDE 33
33
SLIDE 34
34
SLIDE 35 O n i
S e r v i c e P r
e r t i e s
e l f a u t h e n t i c a t e d
( s e l f
e r i f y i n g ? )
n d
n d e n c r y p t e d
A T p u n c h i n g
i mi t e d s u r f a c e a r e a
SLIDE 36 T a k e a w a y s
More variation in onion services than people think. Still a tiny fraction of overall T
Upcoming technical work to make them harder / better / stronger / faster. Please deploy an onion address for your website/service
SLIDE 37 C u r r e n t S e c u r i t y P r
l e m s
n i
i d e n t i t y k e y s a r e t
h
t !
c a n c h
e r e l a y i d e n t i t y k e y s t
a r g e t a p a r t i c u l a r
i
s e r v i c e
c a n r u n r e l a y s t
a r v e s t
i
a d d r e s s e s
y b i l a t t a c k s r e ma i n a n i s s u e f
T
i n g e n e r a l
u a r d d i s c
e r y a t t a c k ( p r
a l 2 4 7 )
b s i t e fj n g e r p r i n t i n g f
i
s e r v i c e s ?
SLIDE 38 H S D i r e c t
y
Hashring
HSDirn
Desc IDrep0 Desc IDrep1
HSDirn+1 HSDirn+2 HSDirn HSDirn+1 HSDirn+2
Desc ID = H(onion-address | H(time-period | descriptor-cookie | replica))
SLIDE 39 H S D i r P r e d i c t i b i l i t y
Desc ID = H(onion-address | H( time-period | descriptor-cookie | replica)) Invariant
11:00 UTC 11:00 UTC
+24
time-period span
DescID k1 DescID k2
11:00 UTC
+48
...
SLIDE 40 S h a r e d R a n d
n e s s
Proposal 250
Desc ID = H(onion-address | H( time-period | random-value | descriptor-cookie | replica))
Invariant
longclaw urras Faravahar moria1 dannenberg tor26 maatuska gabelmoo dizum
random-value
(new every 24h)
SLIDE 41 S h a r e d
a n d
a l u e p h a s e s
00:00 UTC 12:00 UTC
SRV0
Commit2 Reveal1
00:00 UTC
Agree1
12:00 UTC
Commit1 Reveal2
00:00 UTC
...
SRV1
Agree0
SLIDE 42 G u i d e l i n e s f
d
n g y
r T
r e s e a r c h s a f e l y / e t h i c a l l y
r y t
t t a c k
l y y
r s e l f / y
r
n t r a ffjc
n l y c
l e c t d a t a t h a t i s a c c e p t a b l e t
k e p u b l i c
' t c
l e c t d a t a y
d
' t n e e d ( mi n i mi z a t i
)
i mi t t h e g r a n u l a r i t y
d a t a ( e . g . a d d n
s e )
e s c r i b e b e n e fj t s a n d r i s k s , a n d e x p l a i n w h y b e n e fj t s
t w e i g h r i s k s
s i d e r a u x i l i a r y d a t a w h e n a s s e s s i n g t h e r i s k s
s e a T e s t n e t w
k w h e n e v e r p
s i b l e
SLIDE 43 T r i c k y E d g e C a s e s O n i
a d d r e s s h a r v e s t i n g
e t t h e m b y g
l i n g f
.
i
? O k .
e t t h e m b y b e i n g V e r i s i g n a n d l
i n g a t t h e r
n a me s e r v e r s ? H m. O k ?
e t t h e m b y b e i n g C
a s t a n d l
i n g a t y
r D N S l
s ? H m. O k ?
e t t h e m b y r u n n i n g a T
r e l a y , g e t t i n g t h e H S D i r fm a g , a n d l
g i n g w h a t y
s e e ? H m. N
O k .
SLIDE 44
SLIDE 45
SLIDE 46
B e t t e r C r y p t
SLIDE 47 B i g g e r O n i
A d d r e s s nzh3fv6jc6jskki3.onion
From 16 characters: ... to 52 characters:
a1uik0w1gmfq3i5ievxdm9ceu27e88g6o7pe0rfgdw9jmntwkdsd.onion
(ed25519 public key base32 encoded)
SLIDE 48 R e n d e z v
s S i n g l e O n i
S e r v i c e s ( R S O S )
Rendezvous Point Proposal 260
SLIDE 49 S i n g l e O n i
S e r v i c e s ( S O S )
The circuit is extended to the service. No Introduction nor Rendezvous.
Proposal 252
SLIDE 50 O n i
B a l a n c e
S
https://onionbalance.readthedocs.org
SLIDE 51 L
d B a l a n c i n g
Hidden Service
Introduction Rendezvous
HS1 HS2 HS3 HS4
Proposal 255
...
SLIDE 52
52
SLIDE 53 53
“Still the King of high secure, low latency Internet Anonymity” Contenders for the throne:
SLIDE 54
54
SLIDE 55
55