tor
play

TOR https://media.defcon.org/DEF%20CON%2025/DEF%20CON - PowerPoint PPT Presentation

TOR https://media.defcon.org/DEF%20CON%2025/DEF%20CON %2025%20presentations/DEFCON-25-Roger-Dingledine-Next- Generation-Tor-Onion-Services-UPDATED.pdf https://metrics.torproject.org/ https://compass.torproject.org/


  1. TOR https://media.defcon.org/DEF%20CON%2025/DEF%20CON %2025%20presentations/DEFCON-25-Roger-Dingledine-Next- Generation-Tor-Onion-Services-UPDATED.pdf https://metrics.torproject.org/ https://compass.torproject.org/ https://www.torproject.org/about/overview.html.en

  2. Threat Model Alice Anonymity Network Bob

  3. Anonymity serves different interests for different users • private citizens • privacy • businesses • network security • governments • traffic-analysis resistance • human rights activists • reachability

  4. Simple design Joey Y Ross E(X,Chandler) X E(Y,Ross) Chandler Phoebe Relay E(Z,Monica) Z Monica Rachel

  5. Single Point of Failure Joey Y Ross E(X,Chandler) EVIL X E(Y,Ross) Chandler Phoebe RELAY E(Z,Monica) Z Monica Rachel

  6. Question • In the last example, let’s say Jane is a local business’ website run completely over http. • If Alice entered in her username/password into the website, which users along the circuit could read her password?

  7. Usage Statistics Directly connecting users 3 000 000 2 000 000 1 000 000 0 Jul − 2017 Oct − 2017 The Tor Project − https://metrics.torproject.org/

  8. Network Size Number of relays 6000 4000 Relays Bridges 2000 0 Jul − 2017 Oct − 2017 The Tor Project − https://metrics.torproject.org/

  9. Types of Relays Number of relays with relay flags assigned 6000 Relay flags Running 4000 Exit Fast Guard Stable 2000 0 Jul − 2017 Oct − 2017 The Tor Project − https://metrics.torproject.org/

  10. Bandwidth Total relay bandwidth Advertised bandwidth Bandwidth history 200 Bandwidth (Gbit/s) 150 100 50 0 2010 2011 2012 2013 2014 2015 2016 2017 2018 The Tor Project − https://metrics.torproject.org/

  11. Anonymity vs Security • Anonymity: safety in numbers • diversity in users • diversity in relays • Security: safety in heterogeneity

  12. Anonymity vs Security • Open source • Public design documents • Design peer reviewed

  13. Onion Services • Authenticated • End-to-end encryption • Limit surface area • No need to “exit” from TOR • No need for anybody to know where it is or who runs it

  14. 29

  15. 30

  16. Onion keys are getting bigger • From 16 characters: • the first 80 bits of the SHA-1 of the 1024 RSA key • … to 52 characters: • ED25519 public key base32 encoded

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend