overview anonymity systems review of how tor works tor project inc. helper tools and accessories...

25

Upload: lillian-bailey

Post on 19-Jan-2016

231 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors
Page 2: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Overview Anonymity systems Review of how Tor works Tor Project Inc. Helper tools and accessories Advanced Tor control Attack Vectors

Page 3: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Anonymity Systems JAP I2P Freenet Xerobank Botnets

Page 4: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Freenet Storage network p2p based Shares files on your system to other

nodes Plausabile Deniability

Page 5: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

I2P Opposing design of Tor UDP based Darknet design Java, Python, and C API’s Mixed routing based on packets Splits tunneling between upstream and

downstream “Garlic Routing” – mix streams together to

prevent traffic analysis Variable latency design

Page 6: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Tor (not TOR) – previously stood for The

Onion Router Provides a method of anonymity by

passing data between proxies

Page 7: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Network

Page 8: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Terminology Cell – your message Circuit – tunnel made up of relays Entry Node: first hop into the Tor

network Exit Node: last hop before destination Relay Node: middle hop Bridge Node: nodes not listed in the Tor

directory to evade filtering

Page 9: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Who’s Using Tor? Whistleblowers

Wikileaks – runs hidden service Militaries

field ops command and control using hidden

services Chinese journalists and dissidents

Page 10: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Project 501(c)(3) NFP Freely available Full spec and full documentation

Page 11: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Project Finances

https://www.torproject.org/about/financials.html

Page 12: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Current Project Sponsors Federal Grant:

International Program to Support Democracy Human Rights and Labor

$632,189 International Broadcasting Bureau

Voice of America, Radio Free Europe/Radio Liberty, Radio and TV Martí, Radio Free Asia, Radio Sawa/Alhurra TV

$270,000 Stichting.Net

Association of NFP’s in the Netherlands $38,279

Google: $29,083 ITT: $27,000 Other: $9,997 https://www.torproject.org/about/sponsors.html.en

Page 13: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Past Funders DARPA and Naval Research Labratory

2001-2006 EFF – 2004-2005

Page 14: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Performance

Page 15: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Number of Relays

Page 16: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Number of Users

Page 17: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Tools Torbutton Tor Browser Bundle Vidalia TorCheck Arm Tor-ramdisk

Anthony G. Basile from Buffalo

Page 18: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors
Page 19: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Control Port Telnet to the control port Create custom circuits (long or short)

Show live circuit information Change configuration on the fly Map a site to an exit node Reload a configuration

authenticate "“extendcircuit 0 a,b,c,…extendcircuit 0 a,b

setevents circsetconf confitemMapaddress google.com=a.bGetconf confitem

Page 20: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Attacks

Page 21: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Passive Attack Vectors Traffic profiling – entry and exit analysis Cleartext exit node transmission Fingerprinting - OS, browser,

configuration, activity Timing correlation Network partitioning End to end Size correlation

Page 22: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Active Attack Vectors Compromised keys Malicious web servers Malicious Exit/Relay nodes DoS non-controlled nodes Timestamping and tagging Injecting or replacing unencrypted info Malicious Tor client

Page 23: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Tor Client Side Attacks DNS rebinding Disbanding attack – javascript, java,

flash History disclosure Timezone information (partitioning)

Page 24: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

Social Engineering Attacks Getting more traffic

“Use my relay. I have huge tubes!” “Nick’s relay sucks” “I’ve added a feature to my node.”

Replacement 687474703a2f2f7777772e726f636865737465

72323630302e636f6d2f6861782f Partitioning

“Don’t use servers from this country” “These servers are amazing!”

Page 25: Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors

More Info www.torproject.org Metrics.torproject.org Blog.torproject.org Check.torproject.org @torproject