The Tor Project Our mission is to advance human rights and freedoms - - PowerPoint PPT Presentation

the tor project
SMART_READER_LITE
LIVE PREVIEW

The Tor Project Our mission is to advance human rights and freedoms - - PowerPoint PPT Presentation

The Tor Project Our mission is to advance human rights and freedoms by creating and deploying free and open privacy and anonymity technologies, supporting their unrestricted availability and use, and furthering their scientifjc and popular


slide-1
SLIDE 1

The Tor Project

Our mission is to advance human rights and freedoms by creating and deploying free and open privacy and anonymity technologies, supporting their unrestricted availability and use, and furthering their scientifjc and popular understanding.

slide-2
SLIDE 2

Tor Onion Services

... this talk is NOT about the Dark Web

More useful than you think

slide-3
SLIDE 3
  • Online Anonymity

– Open Source – Open Network

  • Community of

researchers, developers, users and relay

  • perators.
  • U.S. 501(c)(3) non-

profjt organization

slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

Onion Service Properties

Self authenticated End-to-end encrypted NAT punching Limit surface area

slide-8
SLIDE 8

Unique .onion addresses

slide-9
SLIDE 9

Estimated Traffjc

slide-10
SLIDE 10

Estimated Traffjc

As of December 2015, ~5% of client traffjc is HS

slide-11
SLIDE 11

Statistics

https://research.torproject.org/tech reports/extrapolating-hidserv-stats- 2015-01-31.pdf

Proposal 238

slide-12
SLIDE 12

Birth - 2004

Changes in version 0.0.6pre1 - 2004-04-08

  • Features:
  • Hidden services and rendezvous points are implemented. Go to

http://6sxoyfb3h2nvok2d.onion/ for an index of currently available hidden services. (This only works via a socks4a proxy such as Privoxy, and currently it's quite slow.)

ChangeLog file entry:

slide-13
SLIDE 13

Early use case - 2006

Souce: wikipedia.org

slide-14
SLIDE 14

Wikileaks - 2007

slide-15
SLIDE 15

GlobaLeaks - 2011

T

  • day, more than 30 projects use GlobaLeaks

https://en.wikipedia.org/wiki/GlobaLeaks#Implementations

slide-16
SLIDE 16

GlobalLeaks - WildLeaks

slide-17
SLIDE 17

SecureDrop - 2013

https://securedrop.org/directory

T

  • day, 22 organizations use SecureDrop
slide-18
SLIDE 18

Aphex Twin release - 2014

slide-19
SLIDE 19

Blockchain - 2014

Security concerns. Avoid exit node attack rewriting bitcoin addresses.

slide-20
SLIDE 20

And Facebook Too - 2015

  • No more worrying about bad certifjcate

authorities

  • Avoids exit relay contention,

traffjc never leaves the network!

  • Ultimately it could be faster than reaching

Facebook with a normal T

  • r circuit
slide-21
SLIDE 21

Public Website

Onion addresses for public websites makes perfect sense: it gives users the choice of what security properties they want

slide-22
SLIDE 22

.onion and EV cert

  • Browsers know to treat cookies/etc like TLS
  • Server-side does not need to treat .onion

specially

  • With an EV cert, the browser shows the user

that it's really Facebook

slide-23
SLIDE 23

Magic of .onion EV certs!

Onion SSL Certifjcates have a magic extra feature, The only EV SSL Certs which can use wildcards!

slide-24
SLIDE 24

Let's Encrypt - 2015

  • What might this look like at scale?
  • Bundle T
  • r with Let's Encrypt, so every

website can add an onion address in its certifjcate?

  • (Some technical and policy barriers

remain)

slide-25
SLIDE 25

RFC7686 - 2015

We haz the .onion!

slide-26
SLIDE 26

OnionShare

https://onionshare.org/

slide-27
SLIDE 27

Ricochet

https://ricochet.im

slide-28
SLIDE 28

Pond

https://pond.imperialviolet.org

slide-29
SLIDE 29

Services and Tools

https://help.riseup.net/en/tor#riseups-tor-hidden-services

All Riseup.net services are available using hidden service ... and many others Package repository

apt-get install apt-tor-transport

http://vwakviie2ienjx6t.onion/

...

slide-30
SLIDE 30

Many Other Services

We know of several Alexa top 500 sites that are currently deploying hidden services

Help us have more!

slide-31
SLIDE 31

Guidelines for doing your Tor research safely/ethically

  • Try to attack only yourself / your own traffjc
  • Only collect data that is acceptable to make

public

  • Don't collect data you don't need (minimization)
  • Limit the granularity of data (e.g. add noise)
  • Describe benefjts and risks, and explain why

benefjts outweigh risks

  • Consider auxiliary data when assessing the risks
  • Use a T

est network whenever possible

slide-32
SLIDE 32

Tricky Edge Cases

Onion address harvesting

  • Get them by googling for .onion? Ok.
  • Get them by being Verisign and looking at

the root nameservers? Hm. Ok?

  • Get them by being Comcast and looking at

your DNS logs? Hm. Ok?

  • Get them by running a T
  • r relay, getting

the HSDir fmag, and logging what you see?

  • Hm. Not Ok.
slide-33
SLIDE 33

Excitement in Pittsburgh

slide-34
SLIDE 34

...Should we start a Tor ethics review board?

Ethics

slide-35
SLIDE 35

Current Security Problems

  • Onion identity keys are too short!
  • You can choose relay identity keys to

target a particular onion service

  • You can run relays to harvest onion

addresses

  • Sybil attacks remain an issue for T
  • r in

general

  • Guard discovery attack (proposal 247)
  • Website fjngerprinting for onion services?
slide-36
SLIDE 36
slide-37
SLIDE 37
slide-38
SLIDE 38
slide-39
SLIDE 39
slide-40
SLIDE 40
slide-41
SLIDE 41
slide-42
SLIDE 42

HS Directory

Hashring

HSDirn

Desc IDrep0 Desc IDrep1

HSDirn+1 HSDirn+2 HSDirn HSDirn+1 HSDirn+2

Desc ID = H(onion-address | H(time-period | descriptor-cookie | replica))

slide-43
SLIDE 43

Next Generation Onion Service (NGOS)

Proposal 224

slide-44
SLIDE 44

HSDir Predictibility

Desc ID = H(onion-address | H( time-period | descriptor-cookie | replica)) Invariant

11:00 UTC 11:00 UTC

+24

time-period span

DescID k1 DescID k2

11:00 UTC

+48

...

slide-45
SLIDE 45

Shared Randomness

Proposal 250

Desc ID = H(onion-address | H( time-period | random-value | descriptor-cookie | replica))

Invariant

longclaw urras Faravahar moria1 dannenberg tor26 matsuka gabelmoo dizum

random-value

(new every 24h)

slide-46
SLIDE 46

Better Crypto

slide-47
SLIDE 47

Bigger Onion Address

nzh3fv6jc6jskki3.onion

From 16 characters: ... to 52 characters:

a1uik0w1gmfq3i5ievxdm9ceu27e88g6o7pe0rfgdw9jmntwkdsd.onion

(ed25519 public key base32 encoded)

slide-48
SLIDE 48

Rendezvous Single Onion Services (RSOS)

Rendezvous Point Proposal 260

slide-49
SLIDE 49

Single Onion Services (SOS)

The circuit is extended to the service. No Introduction nor Rendezvous.

Proposal 252

slide-50
SLIDE 50

OnionBalance - TSoP

https://onionbalance.readthedocs.org

slide-51
SLIDE 51

Takeaways

More variation in onion services than people think. Still a tiny fraction of overall T

  • r traffjc.

Upcoming technical work to make them harder / better / stronger / faster. Please deploy an onion address for your website/service

slide-52
SLIDE 52

Question Time!

slide-53
SLIDE 53

Load Balancing

Hidden Service

Introduction Rendezvous

HS1 HS2 HS3 HS4

Proposal 255

...

slide-54
SLIDE 54

Easy Deployment

Apaf ADD_ONION