T h e T o r P r o j e c t Our mission is to advance - - PowerPoint PPT Presentation

t h e t o r p r o j e c t
SMART_READER_LITE
LIVE PREVIEW

T h e T o r P r o j e c t Our mission is to advance - - PowerPoint PPT Presentation

T h e T o r P r o j e c t Our mission is to advance human rights and freedoms by creating and deploying free and open privacy and anonymity technologies, supporting their unrestricted availability and use, and furthering their


slide-1
SLIDE 1

1

T h e T

  • r

P r

  • j

e c t

Our mission is to advance human rights and freedoms by creating and deploying free and open privacy and anonymity technologies, supporting their unrestricted availability and use, and furthering their scientifjc and popular understanding.

slide-2
SLIDE 2

2

slide-3
SLIDE 3
  • O

n l i n e A n

  • n

y mi t y

– O

p e n S

  • u

r c e

– O

p e n N e t w

  • r

k

  • C
  • mmu

n i t y

  • f

r e s e a r c h e r s , d e v e l

  • p

e r s , u s e r s a n d r e l a y

  • p

e r a t

  • r

s .

  • U

. S . 5 1 ( c ) ( 3 ) n

  • n
  • p

r

  • fj

t

  • r

g a n i z a t i

  • n
slide-4
SLIDE 4

4

Estimated 2,000,000+ daily Tor users

slide-5
SLIDE 5

5

Threat model: what can the attacker do?

Alice Anonymity network Bob watch (or be!) Bob! watch Alice! Control part of the network!

slide-6
SLIDE 6

6

Anonymity isn't encryption: Encryption just protects contents.

Alice Bob “Hi, Bob!” “Hi, Bob!” <gibberish> attacker

slide-7
SLIDE 7

7

Privacy by promise, privacy by design

“You can't prove it was me!” “Promise you won't look!” “Promise you won't remember!” “Promise you won't tell!” “I didn't write my name on it!” “Isn't the Internet already anonymous?”

slide-8
SLIDE 8

8

Anonymity serves different interests for different user groups.

Anonymity

Private citizens “It's privacy!”

slide-9
SLIDE 9

9

Anonymity serves different interests for different user groups.

Anonymity

Private citizens Businesses “It's network security!” “It's privacy!”

slide-10
SLIDE 10

10

Anonymity serves different interests for different user groups.

Anonymity

Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!”

slide-11
SLIDE 11

11

Anonymity serves different interests for different user groups.

Anonymity

Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!” Human rights activists “It's reachability!”

slide-12
SLIDE 12

12

Current situation: Bad people on the Internet are doing fine

Trojans Viruses Exploits Phishing Spam Botnets Zombies Espionage DDoS Extortion

slide-13
SLIDE 13

13

The simplest designs use a single relay to hide connections.

Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B

  • b

2 , “ Z ” ) “Y” “Z” “X”

(example: some commercial proxy providers)

slide-14
SLIDE 14

14

But a single relay (or eavesdropper!) is a single point of failure.

Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Evil Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B

  • b

2 , “ Z ” ) “Y” “Z” “X”

slide-15
SLIDE 15

15

... or a single point of bypass.

Bob2 Bob1 Bob3 Alice2 Alice1 Alice3 Irrelevant Relay E(Bob3,“X”) E(Bob1, “Y”) E ( B

  • b

2 , “ Z ” ) “Y” “Z” “X”

Timing analysis bridges all connections through relay ⇒ An attractive fat target

slide-16
SLIDE 16

16

So, add multiple relays so that no single one can betray Alice.

Bob Alice R1 R2 R3 R4 R5

slide-17
SLIDE 17

17

Alice makes a session key with R1 ...And then tunnels to R2...and to R3

Bob Alice R1 R2 R3 R4 R5 Bob2

slide-18
SLIDE 18

18

slide-19
SLIDE 19

19

Tor's safety comes from diversity

  • #1: Diversity of relays. The more relays

we have and the more diverse they are, the fewer attackers are in a position to do traffic confirmation. (Research problem: measuring diversity over time)

  • #2: Diversity of users and reasons to use
  • it. 50000 users in Iran means almost all of

them are normal citizens.

slide-20
SLIDE 20

20

slide-21
SLIDE 21

21

Orbot

slide-22
SLIDE 22

22

Tails LiveCD

slide-23
SLIDE 23

23

slide-24
SLIDE 24

24

slide-25
SLIDE 25

25

Pluggable transports

slide-26
SLIDE 26

26

Pluggable transports

  • Flashproxy (Stanford), websocket
  • FTEProxy (Portland St), http via regex
  • Stegotorus (SRI/CMU), http
  • Skypemorph (Waterloo), Skype video
  • uProxy (Google), webrtc
  • Lantern (BNS), social network based
  • ScrambleSuit (Karlstad), obfs-based
  • Telex (Michigan/Waterloo), traffic divert
slide-27
SLIDE 27

27

O n i

  • n

S e r v i c e

slide-28
SLIDE 28

28

H i d d e n S e r v i c e s

  • T

h e “ .

  • n

i

  • n

” a d d r e s s e s

– 1

6 c h a r a c t e r s l

  • n

g ( b a s e 3 2 )

– E

. g : n z h 3 f v 6 j c 6 j s k k i 3 .

  • n

i

  • n
  • C

l i e n t a n d S e r v e r h i d e t h e i r l

  • c

a t i

  • n
  • C

a n b e u s e d f

  • r

v a r i

  • u

s k i n d s

  • f

T C P t r a ffjc

  • E

v e r y t h i n g s t a y s i n s i d e t h e T

  • r

n e t w

  • r

k

slide-29
SLIDE 29

29

slide-30
SLIDE 30

30

slide-31
SLIDE 31

31

slide-32
SLIDE 32

32

slide-33
SLIDE 33

33

slide-34
SLIDE 34

34

slide-35
SLIDE 35

O n i

  • n

S e r v i c e P r

  • p

e r t i e s

  • S

e l f a u t h e n t i c a t e d

( s e l f

  • v

e r i f y i n g ? )

  • E

n d

  • t
  • e

n d e n c r y p t e d

  • N

A T p u n c h i n g

  • L

i mi t e d s u r f a c e a r e a

slide-36
SLIDE 36

T a k e a w a y s

More variation in onion services than people think. Still a tiny fraction of overall T

  • r traffjc.

Upcoming technical work to make them harder / better / stronger / faster. Please deploy an onion address for your website/service

slide-37
SLIDE 37

C u r r e n t S e c u r i t y P r

  • b

l e m s

  • O

n i

  • n

i d e n t i t y k e y s a r e t

  • s

h

  • r

t !

  • Y
  • u

c a n c h

  • s

e r e l a y i d e n t i t y k e y s t

  • t

a r g e t a p a r t i c u l a r

  • n

i

  • n

s e r v i c e

  • Y
  • u

c a n r u n r e l a y s t

  • h

a r v e s t

  • n

i

  • n

a d d r e s s e s

  • S

y b i l a t t a c k s r e ma i n a n i s s u e f

  • r

T

  • r

i n g e n e r a l

  • G

u a r d d i s c

  • v

e r y a t t a c k ( p r

  • p
  • s

a l 2 4 7 )

  • We

b s i t e fj n g e r p r i n t i n g f

  • r
  • n

i

  • n

s e r v i c e s ?

slide-38
SLIDE 38

H S D i r e c t

  • r

y

Hashring

HSDirn

Desc IDrep0 Desc IDrep1

HSDirn+1 HSDirn+2 HSDirn HSDirn+1 HSDirn+2

Desc ID = H(onion-address | H(time-period | descriptor-cookie | replica))

slide-39
SLIDE 39

H S D i r P r e d i c t i b i l i t y

Desc ID = H(onion-address | H( time-period | descriptor-cookie | replica)) Invariant

11:00 UTC 11:00 UTC

+24

time-period span

DescID k1 DescID k2

11:00 UTC

+48

...

slide-40
SLIDE 40

S h a r e d R a n d

  • m

n e s s

Proposal 250

Desc ID = H(onion-address | H( time-period | random-value | descriptor-cookie | replica))

Invariant

longclaw urras Faravahar moria1 dannenberg tor26 maatuska gabelmoo dizum

random-value

(new every 24h)

slide-41
SLIDE 41

S h a r e d

  • R

a n d

  • m
  • V

a l u e p h a s e s

00:00 UTC 12:00 UTC

SRV0

Commit2 Reveal1

00:00 UTC

Agree1

12:00 UTC

Commit1 Reveal2

00:00 UTC

...

SRV1

Agree0

slide-42
SLIDE 42

G u i d e l i n e s f

  • r

d

  • i

n g y

  • u

r T

  • r

r e s e a r c h s a f e l y / e t h i c a l l y

  • T

r y t

  • a

t t a c k

  • n

l y y

  • u

r s e l f / y

  • u

r

  • w

n t r a ffjc

  • O

n l y c

  • l

l e c t d a t a t h a t i s a c c e p t a b l e t

  • ma

k e p u b l i c

  • D
  • n

' t c

  • l

l e c t d a t a y

  • u

d

  • n

' t n e e d ( mi n i mi z a t i

  • n

)

  • L

i mi t t h e g r a n u l a r i t y

  • f

d a t a ( e . g . a d d n

  • i

s e )

  • D

e s c r i b e b e n e fj t s a n d r i s k s , a n d e x p l a i n w h y b e n e fj t s

  • u

t w e i g h r i s k s

  • C
  • n

s i d e r a u x i l i a r y d a t a w h e n a s s e s s i n g t h e r i s k s

  • U

s e a T e s t n e t w

  • r

k w h e n e v e r p

  • s

s i b l e

slide-43
SLIDE 43

T r i c k y E d g e C a s e s O n i

  • n

a d d r e s s h a r v e s t i n g

  • G

e t t h e m b y g

  • g

l i n g f

  • r

.

  • n

i

  • n

? O k .

  • G

e t t h e m b y b e i n g V e r i s i g n a n d l

  • k

i n g a t t h e r

  • t

n a me s e r v e r s ? H m. O k ?

  • G

e t t h e m b y b e i n g C

  • mc

a s t a n d l

  • k

i n g a t y

  • u

r D N S l

  • g

s ? H m. O k ?

  • G

e t t h e m b y r u n n i n g a T

  • r

r e l a y , g e t t i n g t h e H S D i r fm a g , a n d l

  • g

g i n g w h a t y

  • u

s e e ? H m. N

  • t

O k .

slide-44
SLIDE 44
slide-45
SLIDE 45
slide-46
SLIDE 46

B e t t e r C r y p t

slide-47
SLIDE 47

B i g g e r O n i

  • n

A d d r e s s nzh3fv6jc6jskki3.onion

From 16 characters: ... to 52 characters:

a1uik0w1gmfq3i5ievxdm9ceu27e88g6o7pe0rfgdw9jmntwkdsd.onion

(ed25519 public key base32 encoded)

slide-48
SLIDE 48

R e n d e z v

  • u

s S i n g l e O n i

  • n

S e r v i c e s ( R S O S )

Rendezvous Point Proposal 260

slide-49
SLIDE 49

S i n g l e O n i

  • n

S e r v i c e s ( S O S )

The circuit is extended to the service. No Introduction nor Rendezvous.

Proposal 252

slide-50
SLIDE 50

O n i

  • n

B a l a n c e

  • T

S

  • P

https://onionbalance.readthedocs.org

slide-51
SLIDE 51

L

  • a

d B a l a n c i n g

Hidden Service

Introduction Rendezvous

HS1 HS2 HS3 HS4

Proposal 255

...

slide-52
SLIDE 52

52

slide-53
SLIDE 53

53

“Still the King of high secure, low latency Internet Anonymity” Contenders for the throne:

  • None
slide-54
SLIDE 54

54

slide-55
SLIDE 55

55