anonymity loves diversity: the case of tor

45
Anonymity loves Diversity: The Case of Tor Georg Koppen Alexander Færøy November 1, 2020 FOSS North

Upload: others

Post on 05-Jun-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Anonymity loves Diversity: The Case of Tor

Anonymity loves Diversity: The Case of Tor

Georg Koppen Alexander FærøyNovember 1, 2020FOSS North

Page 2: Anonymity loves Diversity: The Case of Tor

About Georg

• Started volunteering around 2010• Core Developer at The Tor Project

since 2013• Led the Tor Browser team from

2016-2019• Transitioned to network health work

in 2020

Page 3: Anonymity loves Diversity: The Case of Tor

About Alexander

• Core Developer at The Tor Projectsince early 2017.

• Free So�ware developer since 2006.• Worked with distributed systems in

the Erlang programming language,WebKit-based mobile web browsers,consulting, and firmwaredevelopment.

• Co-organizing the annual Danishhacker festival BornHack.

Page 4: Anonymity loves Diversity: The Case of Tor

What is Tor?

• Online anonymity, and censorshipcircumvention.◦ Free so�ware.◦ Open network.

• Community of researchers,developers, users, and relayoperators.

• U.S. 501(c)(3) non-profitorganization.

Page 5: Anonymity loves Diversity: The Case of Tor

History

Early 2000s Working with the U.S. Naval Research Laboratory.2004 Sponsorship by the Electronic Frontier Foundation.2006 The Tor Project, Inc. became a non-profit.2008 Tor Browser development.2010 The Arab spring.2013 The summer of Snowden.2018 Anti-censorship team created.2019 Tor Browser for Android released.2020 Network Health team created.

Page 6: Anonymity loves Diversity: The Case of Tor
Page 7: Anonymity loves Diversity: The Case of Tor

Somewhere between 2,000,000 and 8,000,000 daily users.

Page 8: Anonymity loves Diversity: The Case of Tor

A Simple Design

Relay

Enc(Bob3 , ”x”)

"x"

Enc(Bob1, ”y”)

"y"

Enc(Bob2

, ”z”)

"z"

Equivalent to some commercial proxy providers.

Page 9: Anonymity loves Diversity: The Case of Tor

A Simple Design

EvilRelay

Enc(Bob3 , ”x”)

"x"

Enc(Bob1, ”y”)

"y"

Enc(Bob2

, ”z”)

"z"

Page 10: Anonymity loves Diversity: The Case of Tor

A Simple Design

Relay

Enc(Bob3 , ”x”)

"x"

Enc(Bob1, ”y”)

"y"

Enc(Bob2

, ”z”)

"z"

Timing analysis bridges all connections going through the relay.

Page 11: Anonymity loves Diversity: The Case of Tor

The Tor DesignAlice Bob

Anonymity Network

R1 R2

R3

R4

R5 R6

R7

Add multiple relays so that no single relay can betray Alice.

Page 12: Anonymity loves Diversity: The Case of Tor

The Tor DesignAlice Bob

Anonymity Network

R1 R2

R3

R4

R5 R6

R7

Alice picks a path through the network: R1, R2, and R3 before finallyreaching Bob.

Page 13: Anonymity loves Diversity: The Case of Tor

The Tor Design

Anonymity NetworkAlice Bob

R1 R2

R3

R4

R5 R6

R7

Alice makes a session key with R1.

Page 14: Anonymity loves Diversity: The Case of Tor

The Tor Design

Anonymity NetworkAlice Bob

R1 R2

R3

R4

R5 R6

R7

Alice asks R1 to extend to R2.

Page 15: Anonymity loves Diversity: The Case of Tor

The Tor Design

Anonymity NetworkAlice Bob

R1 R2

R3

R4

R5 R6

R7

Alice asks R2 to extend to R3.

Page 16: Anonymity loves Diversity: The Case of Tor

The Tor Design

Anonymity NetworkAlice Bob

R1 R2

R3

R4

R5 R6

R7

Alice finally asks R3 to connect to Bob.

Page 17: Anonymity loves Diversity: The Case of Tor

Anonymity isn’t EncryptionAlice Bob

...RG9uJ3QgdXNlIGJhc2U2NCBmb3IgZW5jcnlwdGlvbi4...

Gibberish!

Encryption just protects contents.

Page 18: Anonymity loves Diversity: The Case of Tor

Metadata

"We Kill People Based on Metadata."

—Michael Hayden, former director of the NSA.

Page 19: Anonymity loves Diversity: The Case of Tor

BridgesCensored Region

R1

R2

R3

R4

R5

B1

B2

B3

B4

B5

Alice Bob

Page 20: Anonymity loves Diversity: The Case of Tor

BridgesCensored Region

Alice Bridge

Tor Protocol

Page 21: Anonymity loves Diversity: The Case of Tor

Bridges and Pluggable TransportsCensored Region

Alice

PT Client

Bridge

PT ServerObfuscated Protocol

Page 22: Anonymity loves Diversity: The Case of Tor

Pluggable Transports

• Allows people to easily build, experiment, and deploy theirown obfuscation technology without having to modify the Torsource code itself.

• The specification for Pluggable Transports is open and allowsother vendors to implement support for PTs in their ownproducts.

• Allows people to experiment with di�erent transports for Torthat might not be doing any anti-censorship relatedobfuscation.

Page 23: Anonymity loves Diversity: The Case of Tor

Obfourscator (obfs4)

• Makes it hard for passive DPI to verify the presence of theobfs4 protocol unless the adversary knows the bridgeparameters.

• Makes active probing hard unless the adversary knows thebridge parameters.

• Uses Tor’s ntor handshake (x25519), but uses Elligator2 toencode the elliptic-curve points to be indistinguishable fromuniform random strings. The link layer encryption uses NaClsecret boxes (XSalsa20 and Poly1305).

Page 24: Anonymity loves Diversity: The Case of Tor

SNI Domain Fronting using MeekCensored Region

AliceA? ajax.aspnetcdn.comDNS

SNI: ajax.aspnetcdn.comTLS

POST / HTTP/1.1Host: meek.azureedge.net

...

HTTP

Bridge

Webserver

Page 25: Anonymity loves Diversity: The Case of Tor

SnowflakeCensored Region

Alice

Snowflake PT Client Snowflake PT Server

BridgeSnowflake Broker

Page 26: Anonymity loves Diversity: The Case of Tor

The Tor Network

• An open network – everybody can join!• Between 6000 and 7000 relay nodes.• Kindly hosted by various individuals, companies, and

non-profit organisations.• 9 Directory Authority nodes and 1 Bridge Authority node.

Page 27: Anonymity loves Diversity: The Case of Tor

The Tor Network

2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

0

200

400

600

BandwidthinGbit/s

Total Relay Bandwidth

Advertised BandwidthBandwidth History

Source: metrics.torproject.org

Page 28: Anonymity loves Diversity: The Case of Tor

The Tor Network

2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

0

2,000

4,000

6,000

8,000

Number of Relays

RelaysBridges

Source: metrics.torproject.org

Page 29: Anonymity loves Diversity: The Case of Tor

The Tor Network

Tor’s safety comes from diversity:

1. Diversity of relays. The more relays we have and the morediverse they are, the fewer attackers are in a position to dotra�ic confirmation.

2. Diversity of users and reasons to use it. 50,000 users in Iranmeans almost all of them are normal citizens.

Research problem: How do we measure diversity over time?

Page 30: Anonymity loves Diversity: The Case of Tor

The Tor Network

2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020

0

2,000

4,000

6,000

Number of Relays per Platform

LinuxBSDWindowsmacOSOther

Source: metrics.torproject.org

Page 31: Anonymity loves Diversity: The Case of Tor

The Tor Network# Country Relays

1 Germany 15172 United States 11143 France 6774 Netherlands 3595 Canada 2566 United Kingdom 2467 Switzerland 1938 Sweden 1919 Russian Federation 18710 Lithuania 17922 Norway 6927 Denmark 44

Page 32: Anonymity loves Diversity: The Case of Tor
Page 33: Anonymity loves Diversity: The Case of Tor
Page 34: Anonymity loves Diversity: The Case of Tor

The Tor Network

Network Relays

185.220.0.0/16 21651.81.0.0/16 9751.15.0.0/16 87185.150.0.0/16 68163.172.0.0/16 59172.105.0.0/16 5795.216.0.0/16 56195.189.0.0/16 5551.195.0.0/16 4951.91.0.0/16 40

Page 35: Anonymity loves Diversity: The Case of Tor

The Tor Network

AS Number Name Relays

AS 16276 OVH, FR 770AS 24940 HETZNER-AS, DE 403AS 12876 Online SAS, FR 263AS 63949 LINODE-AP Linode, LLC, US 240AS 14061 DIGITALOCEAN-ASN, US 166AS 208294 ASMK, NL 140AS 197540 NETCUP-AS netcup GmbH, DE 138AS 53667 PONYNET, US 136AS 3320 DTAG Internet service provider operations, DE 118AS 16125 CHERRYSERVERS1-AS, LT 104

Page 36: Anonymity loves Diversity: The Case of Tor

The Tor Network

Malicious relays and what we (plan to) do about them:

• Malicious guard+exit relays (Guard pinning, MyFamilysettings)

• Malicious exit relays◦ Exit scanning (e.g. against SSL strip attacks)◦ Blacklisting found relays (but: that’s an uphill battle)◦ Application-level improvements (HTTPS-only mode)◦ Limit weight/influence of unknown relays

Page 37: Anonymity loves Diversity: The Case of Tor

Applications

Anonymity

GovernmentsIt’s tra�ic-analysis

resistance!

Human Rights Activists

It’s reachability!

Private Citizens

It’s privacy!

Businesses

BP

It’s networksecurity!

Page 38: Anonymity loves Diversity: The Case of Tor

Applications

• Many users with di�erent backgrounds helps against singlingindividuals out

• But how do we prevent all those users from gettingfingerprinted due to their di�erent computers?◦ Make everyone look the same◦ Obscure real values by spoofing/faking them

Page 39: Anonymity loves Diversity: The Case of Tor

Applications• Many users with di�erent backgrounds helps with usability,

privacy protections, and security

Page 40: Anonymity loves Diversity: The Case of Tor

Applications• There are downsides we have to deal with, e.g. user blocking

or CAPTCHAs

Page 41: Anonymity loves Diversity: The Case of Tor

Applications

Possible mitigations to Tor blocking:

• Outreach? (but that does not scale)• PoW schemes? (might help against onion service DoS, too,

see: proposal 327)• Anonymous credentials?• Paid exit relays?

Page 42: Anonymity loves Diversity: The Case of Tor

How can you help?

• Hack on some of our cool projects.• Find, and maybe fix, bugs in Tor.• Test Tor on your platform of choice.• Work on some of the many open

research projects.• Run a Tor relay or a bridge!• Teach others about Tor and privacy in

general.

Page 43: Anonymity loves Diversity: The Case of Tor

Donate at donate.torproject.org

Page 44: Anonymity loves Diversity: The Case of Tor

Questions?

Page 45: Anonymity loves Diversity: The Case of Tor

This work is licensed under a

Creative CommonsAttribution-ShareAlike 4.0 International License

cba