anonymous communications - tor · tor user encrypted tunnel unencrypted tcp exit node entry node...

45
Anonymous Communications Andrew Lewman [email protected] December 05, 2012 Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 1 / 45

Upload: others

Post on 04-Apr-2020

41 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Anonymous Communications

Andrew Lewman [email protected]

December 05, 2012

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 1 / 45

Page 2: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Who is this guy?501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy

https://www.torproject.org

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 2 / 45

Page 3: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Three hours of this guy talking?

Let’s hope not.

Ask questions; early and often.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 3 / 45

Page 4: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Agenda

Definitions and Concepts of Anonymity

What data?

Attacks against anonymity

Deployed Systems (Centralized and Decentralized)

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 4 / 45

Page 5: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

What is Anonymity?

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 5 / 45

Page 6: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Anonymity

a set of all possible subjects

state of not being identifiable within anonymity set

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 6 / 45

Page 7: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Unlinkability

unlinkability of two or more items of interest from the adversary’sperspective

I items can be messages, people, events, actions, etc

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 7 / 45

Page 8: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Unobservability

state of items of interest being indistinguishable from any items ofinterest

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 8 / 45

Page 9: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Pseudonymity

identifiers of sets of subjects

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 9 / 45

Page 10: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Traffic Analysis

The who, what, when of traffic

Think of the post office

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 10 / 45

Page 11: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Steganography

the art and science of writing hidden messages in such a way that noone, apart from the sender and intended recipient, suspects theexistence of the message, a form of security through obscurity. –Wikipedia

alice or bob are talking, but to whom?

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 11 / 45

Page 12: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Definitions: Cryptography

protecting content in transit

does nothing to hide the traffic of items of interest

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 12 / 45

Page 13: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

What data to protect?

bits of info which put together deanonymize you

Names of individuals

location address (street, IP address, zipcode, etc)

operating system info

language info

amount of data sent

amount of data received

traffic timing (heartbeats)

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 13 / 45

Page 14: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Anonymity Loves Company

make the set of users as large and coherent as possible to create alarge anonymity set

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 14 / 45

Page 15: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacking Anonymity: Timing Analysis

An attack used to analyze the time properties of data transferbetween items of interest.

I When was data sent?I How much was data sent?I How long did it take to send the data?I When was data received?

wireshark demo

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 15 / 45

Page 16: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacking Anonymity: Timing Analysis

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 16 / 45

Page 17: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacking Anonymity: Statistical Disclosure

Also called an intersection attack

trying to identify mutually disjoint sets of recipients

exponential time involved per number of messages to be analyzed

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 17 / 45

Page 18: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacking Anonymity: Tagging

tagging (make one item of interest unique)

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 18 / 45

Page 19: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacking Anonymity: Traffic Confirmation

who sends, how often, and when

etherape demo

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 19 / 45

Page 20: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Centralized Systems

cheap, easy, ubiquitous

PPTP, IPSec, SSL, SSH, XMPP common protocols

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 20 / 45

Page 21: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Proxy and VPN Servers

proxy server works on your behalf

VPN is virtual private network

I proxy for the network layers (layers 2 or 3 of OSI model)

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 21 / 45

Page 22: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Proxy and VPN Servers

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 22 / 45

Page 23: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Trusting the provider

trusting the provider

promises, contracts, mistakes

some may filter or clean data before passing on to destination

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 23 / 45

Page 24: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Trusting the provider

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 24 / 45

Page 25: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Irrelevant provider

Single machine, or cluster of machines, are connected to a network

If the proxy provider won’t cooperate, use the network around it.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 25 / 45

Page 26: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Irrelevant provider

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 26 / 45

Page 27: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Decentralized Systems

Mix Networks

cascades (JonDos/JonDonym)

routes (tor)

Similar Routing networks

I2P - Garlic routing, closed network, anonymity and reputation

Freenet - closed network, anonymity, distributed file storage andsharing

GNUnet - closed network, anonymity, distributed file storage andsharing

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 27 / 45

Page 28: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Break?Anyone need a bio-break for 10 minutes?

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 28 / 45

Page 29: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

What is Tor?

online anonymity software and network

open source, freely available (3-clause BSD license)

active research environment:

Drexel, Univ of Waterloo, Georgia Tech, Princeton, Boston University,University College London, Univ of Minnesota, National ScienceFoundation, Naval Research Labs, Cambridge UK, Bamberg Germany,MIT. . .

increasingly diverse toolset:

Tor, Tor Browser Bundle, Tails Live System, Orbot/OrWeb, Tor Weather,Tor auto-responder, Secure Updater, Arm, Tor2Web, and so on.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 29 / 45

Page 30: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Who uses Tor?

Normal people

Journalists

LawEnforcement

Human RightsActivists

Business Execs

Militaries

Abuse Victims

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 30 / 45

Page 31: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

How many people use Tor?estimated 500k to 900k daily users

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 31 / 45

Page 32: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

How does Tor work?

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 32 / 45

Page 33: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

How does Tor work?

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor userTor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 33 / 45

Page 34: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

How does Tor work?

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 34 / 45

Page 35: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

How does Tor work?

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 35 / 45

Page 36: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacks on Tor

First hop can learn your IP address.

Last hop can watch your traffic.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 36 / 45

Page 37: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacks on Tor

Adversary can block all Tor nodes by IP address and TCP port

I our answer is to use non-public relays called Bridges

Adversary can legally harass last hop; DMCA, Child Abuse Materials,Threats, etc

Adversary can run relays, use network to restrict access to other relays

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 37 / 45

Page 38: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacks on TorDeep Packet Inspection

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 38 / 45

Page 39: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Attacks on Tor

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 39 / 45

Page 40: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

The Future: Usability

Who are our users? What do they understand about anonymity, Tor, andprivacy online? Can we guide them to make smarter decisions? How do weeducate them before they start?

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 40 / 45

Page 41: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

The Future: Obfsproxy & Pluggable Transports

Obfuscating proxy for network traffic

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 41 / 45

Page 42: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

The Future: Scaling

Why not 10,000 relays? Why not 1 million? 10 million? Needprivacy-preserving Scalable Distributed Hash Table designs

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 42 / 45

Page 43: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

The Future: IPv6

Basic support for IPv6 clients and relays works now. Need support for IPv6destinations and pure IPv6 relays

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 43 / 45

Page 44: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

The Future: UDP

Tor only transports TCP packets now. This limits usable applicationsNeed to support real-time video and audio chats over Tor.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 44 / 45

Page 45: Anonymous Communications - Tor · Tor user Encrypted tunnel Unencrypted TCP Exit node Entry node ... Anonymous Communications December 05, 2012 37 / 45. ... Need to support real-time

Thanks!

Visit https://www.torproject.org for more information, links, and ideas.

Andrew Lewman [email protected] () Anonymous Communications December 05, 2012 45 / 45