onion routing and tor: fundamentals and anonymity

27
Onion Routing and Tor: Fundamentals and anonymity Anurag Singh

Upload: anurag-singh

Post on 15-Jul-2015

633 views

Category:

Engineering


1 download

TRANSCRIPT

Page 1: Onion routing and tor: Fundamentals and Anonymity

Onion Routing and Tor:

Fundamentals and anonymity

Anurag Singh

Page 2: Onion routing and tor: Fundamentals and Anonymity

Anonymity: Overview

Page 3: Onion routing and tor: Fundamentals and Anonymity

What is Anonymity ?

Anonymity is the state of being

unidentifiable within a set of subjects.

◦ Hide your activities among others’ similar

activities

◦ You cannot be anonymous by yourself!

Unlinkability of action and identity

Unobservability (hard to achieve) Observer cannot even tell whether a certain

action took place or not

Page 4: Onion routing and tor: Fundamentals and Anonymity

You Are Not Anonymous

Your IP address can be linked directly to

you

◦ ISPs store communications records

◦ Usually for several years (Data Retention

Laws)

◦ Law enforcement can subpoena these

records

Your browser is being tracked

◦ Cookies, Flash cookies, E-Tags, HTML5

Storage

◦ Browser fingerprinting

Your activities can be used to identify

Page 5: Onion routing and tor: Fundamentals and Anonymity

Who Uses Anonymity

Systems ? “If you’re not doing anything wrong,

you shouldn’t have anything to hide.”• Implies that anonymous communication is

for criminals

The truth: who uses Tor?• Journalists

• Law enforcement

• Human rights activists

• Normal people

Fact: Tor was/is developed by the Navy

• Business executives

• Military/intelligence

personnel

• Abuse victims

Page 6: Onion routing and tor: Fundamentals and Anonymity

Why Do We Need Anonymity

? To protect privacy◦ Avoid tracking by advertising companies

◦ Viewing sensitive content Information on medical conditions

Advice on bankruptcy

Protection from prosecution◦ Not every country guarantees free speech

To prevent chilling-effects◦ It’s easier to voice unpopular or

controversial opinions if you areanonymous

Page 7: Onion routing and tor: Fundamentals and Anonymity

Anonymity Layer

Function:

◦ Hide the source,

destination, and content of

Internet flows from

eavesdroppers

Key challenge:

◦ Defining and quantifying

anonymity

◦ Building systems that are

resilient to

deanonymization

◦ Maintaining performance

Application

Presentatio

nSession

Transport

Network

Data Link

Physical

Anonymity

Page 8: Onion routing and tor: Fundamentals and Anonymity

Related Work

Chaum’s Mix-Net design◦ Correspondence hiding between sender &

receiver by wrapping messages in layersand relaying through “mix” routers.

Babel ‘s Mix master and Mixminion◦ Try to maximize anonymity at the cost of high

latency.

Anonymizer◦ Single-hop proxy

PipeNet◦ Low-latency design giving user anonymity by

shutting down the network by not sending.

Page 9: Onion routing and tor: Fundamentals and Anonymity

Related Work

P2P Tarzan and MorphMix designs◦ Rely and generate traffic for other participating

users and hide who originated or relayed a request.

Hordes/Crowds◦ Hides the initiator of traffic thorough multicast

responses

Freedom◦ Supports session keys and address of the server

in a circuit.

Rennhard’s Anonymity Network◦ Builds circuits in stages which helps to obtain

perfect forward secrecy by extending them one hop at a time.

Page 10: Onion routing and tor: Fundamentals and Anonymity

Threats to Anonymity

Traffic Analysis◦ Passive traffic analysis

Infer from network traffic who is talking to whom

To hide your traffic, must carry other people’s traffic!

◦ Active traffic analysis Inject packets or put a timing signature on packet flow.

Compromised network nodes (routers)◦ It is not obvious which nodes have been

compromised Attacker may be passively logging traffic

◦ Better not to trust any individual node Assume that some fraction of nodes is good, don’t know

which

Page 11: Onion routing and tor: Fundamentals and Anonymity

How Traffic Analysis Work ?

Internet data packets have two parts:◦ a data payload

Generally Encrypted

traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. because

◦ a header used for routing it focuses on the header, which discloses source,

destination, size, timing, and so on.

simple traffic analysis◦ sitting somewhere between sender and recipient on

the network, looking at headers.

sophisticated traffic analysis

Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

Page 12: Onion routing and tor: Fundamentals and Anonymity

Onion Routing (Original)

A techniquefor anonymous communicationover a computer network.

Messages are repeatedly encrypted andthen sent through several network nodescalled onion routers.

Like someone peeling an onion,each onionrouter removes a layer of encryption touncover routing instructions, and sends themessage to the next router where this isrepeated.

This prevents these intermediary nodesfrom knowing the origin, destination, andcontents of the message.

Page 13: Onion routing and tor: Fundamentals and Anonymity

Onion Router and Analogy

Page 14: Onion routing and tor: Fundamentals and Anonymity

Tor

(The Second Generation Onion

Router) a distributed, anonymous network

reduce the risks of both simple andsophisticated traffic analysis bydistributing transactions over severalplaces on the Internet.

data packets on the Tor network takea random pathway through severalrelays.

no observer at any single point can tellwhere the data came from or whereit's going.

Page 15: Onion routing and tor: Fundamentals and Anonymity

Tor

(The Second Generation Onion

Router) Basic design: a mix network with

improvements◦ Perfect forward secrecy

◦ Introduces guards to improve source anonymity

◦ Takes bandwidth into account when selecting relays Mixes in Tor are called relays

◦ Introduces hidden services Servers that are only accessible via the Tor

overlay

Page 16: Onion routing and tor: Fundamentals and Anonymity

Deployment and Statistics

Largest, most well deployed anonymitypreserving service on the Internet◦ Publicly available since 2002

◦ Continues to be developed and improved

Currently, ~5000 Tor relays around theworld◦ All relays are run by volunteers

◦ It is suspected that some are controlled byintelligence agencies

500K – 900K daily users◦ Numbers are likely larger now, thanks to

Snowden

Page 17: Onion routing and tor: Fundamentals and Anonymity

How Tor Works ?

Courtesy: https://www.torproject.org/about/overview.html.en

Page 18: Onion routing and tor: Fundamentals and Anonymity

How Tor Works ?...Circuit

Setup

Courtesy: https://www.torproject.org/about/overview.html.en

Page 19: Onion routing and tor: Fundamentals and Anonymity

How Tor Works ?....new

connection

Courtesy: https://www.torproject.org/about/overview.html.en

Page 20: Onion routing and tor: Fundamentals and Anonymity

Tor Enhancements over

Previous

Onion Routing applications Tor uses telescoping path-built design ◦ Previous designs allowed hostiles to record traffic

and compromise successive nodes.

Tor uses SOCKS proxy interface◦ Previous designs required a separate application

proxy for each application protocol. Tor is able to share one circuit for many

TCP streams◦ Previous designs required a separate circuit for

each application level request. Which is a threat to

anonymity. Leaky pipe circuit topology

Page 21: Onion routing and tor: Fundamentals and Anonymity

Tor Enhancements over

Previous

Onion Routing applications Directory servers◦ Previous designs resorted to flooding info on

the network.

Variable exit policies End-to-end integrity checks◦ Previous designs had no integrity checks.

Rendezvous points/hidden services◦ Previous designs included replay onions.

Congestion control: uses end-to-end acks◦ Previous designs didn’t address traffic

bottlenecks.

Page 22: Onion routing and tor: Fundamentals and Anonymity

Hidden Services

Tor is very good at hiding the source of traffic

◦ But the destination is often an exposed website

What if we want to run an anonymous service?

◦ i.e. a website, where nobody knows the IP address?

Tor supports Hidden Services

◦ Allows you to run a server and have people connect

◦ … without disclosing the IP or DNS name

Many hidden services

◦ Tor Mail, Tor Char

◦ DuckDuckGo

◦ Wikileaks

• The Pirate Bay

• Silk Road (2.0)

Page 23: Onion routing and tor: Fundamentals and Anonymity

Hidden Services Example:

Creating a hidden Server

Server creates circuitsto “introduction points”

Server gives intro points’descriptors and addresses to service lookup directory

Client obtains servicedescriptor and intro pointaddress from directory

Page 24: Onion routing and tor: Fundamentals and Anonymity

Using a Location Hidden

Service

Client sends address of therendezvous point and anyauthorization, if needed, toserver through intro point

If server chooses to talk to client,connect to rendezvous point

If server chooses to talk to client,connect to rendezvous point

Client creates a circuitto a “rendezvous point”

Page 25: Onion routing and tor: Fundamentals and Anonymity

Staying Anonymous

Tor can't solve all anonymity problems.

It focuses only on protecting the transport of data

to protect your anonymity, be smart.

Tor does not provide protection against end-to-end timing attacks: ◦ If your attacker can watch the traffic coming

out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

Page 26: Onion routing and tor: Fundamentals and Anonymity

The Future of Tor

Providing a usable anonymizingnetwork on the Internet today is an ongoing challenge.

Recent activities like NSA snooping.

More number of users attracted towards Tor.

Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.

Page 27: Onion routing and tor: Fundamentals and Anonymity

THANKYOU