The Tor Project, Inc. Our mission is to be the global resource for - - PowerPoint PPT Presentation

the tor project inc
SMART_READER_LITE
LIVE PREVIEW

The Tor Project, Inc. Our mission is to be the global resource for - - PowerPoint PPT Presentation

The Tor Project, Inc. Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention. 1 Alice makes a session key with


slide-1
SLIDE 1

1

The Tor Project, Inc.

Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom

  • f speech, privacy rights online, and

censorship circumvention.

slide-2
SLIDE 2

2

Alice makes a session key with R1 ...And then tunnels to R2...and to R3

Bob Alice R1 R2 R3 R4 R5 Bob2

slide-3
SLIDE 3

3

slide-4
SLIDE 4

4

Other components Tor

  • Directory authorities
  • Exits (and exit policies)
  • Entry guards

– Predecessor attack, DoS-as-DoA attack – raise startup cost to evil relay operator

  • Bridges (and pluggable transports)
  • Hidden services
slide-5
SLIDE 5

5

Other pieces of Tor

  • Load balancing

– Weight relay section by bandwidth – Avoid guards for other than first hop,

avoid exits for other than last hop

– “bandwidth authority” active testing

  • Client-side “circuit build timeout” to avoid

worst 20% of circuits

  • Various scheduling / priority decisions
slide-6
SLIDE 6

6

Anybody can sign up to be a relay

  • Torservers.net
  • CCC relays in Germany
  • DFRI in Sweden
  • Noisebridge in the US
  • Nos Oignons in France
slide-7
SLIDE 7

7

slide-8
SLIDE 8

8

slide-9
SLIDE 9

9

slide-10
SLIDE 10

10

slide-11
SLIDE 11

11

slide-12
SLIDE 12

12

slide-13
SLIDE 13

13

slide-14
SLIDE 14

14

Tor aims for three anonymity properties

  • #1: A local network attacker can't learn your

destination.

  • #2: No single relay can link you to your

destination.

  • #3: The destination, or somebody watching it,

can't learn your location.

slide-15
SLIDE 15

15

Anonymity: the old hope

  • “Anonymity is a function of number of

concurrent messages.”

  • But, flows are much trickier: they're wildly

different sizes, and users expect them to arrive in close-to-real-time.

  • More plausible in constrained situation like

VoIP?

slide-16
SLIDE 16

16

Anonymity: Diversity of relays

  • “Given an attacker who can control or observe

this set of relays and/or Internet links, we can compute his chances of discovering a given Alice-Bob link.”

– AS- or IX-level attackers

  • ...Syrian Tor user visiting website in Syria?
slide-17
SLIDE 17

17

slide-18
SLIDE 18

18

slide-19
SLIDE 19

19

slide-20
SLIDE 20

20

slide-21
SLIDE 21

21

slide-22
SLIDE 22

22

slide-23
SLIDE 23

23

slide-24
SLIDE 24

24

slide-25
SLIDE 25

25

compass.torproject.org

slide-26
SLIDE 26

26

compass.torproject.org

slide-27
SLIDE 27

27

compass.torproject.org

slide-28
SLIDE 28

28

compass.torproject.org

slide-29
SLIDE 29

29

slide-30
SLIDE 30

30

slide-31
SLIDE 31

31

slide-32
SLIDE 32

32

slide-33
SLIDE 33

33

Anonymity serves different interests for different user groups.

Anonymity

Private citizens Governments Businesses “It's traffic-analysis resistance!” “It's network security!” “It's privacy!” Human rights activists “It's reachability!”

slide-34
SLIDE 34

34

Anonymity: Diversity of *users*?

  • Can't have an anonymity network for just

cancer survivors

  • 50000 daily Tor users in Iran means

almost all of them are normal citizens

  • But, the smaller the area, the smaller the

anonymity set

slide-35
SLIDE 35

35

Anonymity: End-to-end correlation?

  • Website fingerprinting is a real issue, and

may be amenable to partial solutions like padding

  • Can we resurrect the anonymity set?
  • “Crank up the false positives with enough

users”

slide-36
SLIDE 36

36

Coming soon(*)

  • Stream isolation
  • Multi-path circuits
  • Congestion-aware routing
  • Mixed-latency designs?
  • Load balancing based on link properties
  • Incentives to be a relay
  • Trust-based path selection
  • Scalable directory servires (PIRTor, etc)
slide-37
SLIDE 37

37

What happens to anonymity...

  • ...if we assign the Guard flag differently?
  • ...if we load balance by active

measurement rather than consensus bw?

  • ...if we cap the weights for new relays?
  • ...if we discard all relays under bw X?
  • ...if we discard X% highest-latency paths?
  • ...if Alice chooses her paths to optimize

some other network parameter like jitter?