protecting your privacy with freebsd and torbrueffer/slides/freebsd_tor_meetbsd07.pdftor hidden...

34
Protecting your Privacy with FreeBSD and Tor Christian Brüffer [email protected] MeetBSD – Warsaw, Poland November 18, 2007

Upload: others

Post on 05-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

Protecting your Privacy with FreeBSD and Tor

Christian Brü[email protected]

MeetBSD – Warsaw, Poland

November 18, 2007

Page 2: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 2

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 3: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 3

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take of?● Demonstration● Summary

Page 4: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 4

Who needs anonymity anyway?

● Journalists● Informants, whistleblowers● Dissidents (China, Myanmar...)● Socially sensitive information (abuse, AIDS)● Law enforcement (anonymous crime

reporting, tips, surveillance...)● Companies (research competition...)● Military (covert operations...)

Page 5: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 5

Who needs anonymity anyway?

● You?– EU data retention directive

● connection data gets stored for 6 – 24 months● phone, SMS, IP, e-mail, dial-in data● (finally we'll be safe from all those terrorists!)

– which interests do you have?– who do you talk to?

Page 6: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 6

Who needs anonymity anyway?

● Criminals– already do illegal stuff– no problem doing more illegal stuff to get

anonymity● identity theft● renting bot-nets● creating bot-nets● cracking one of the thousands of insecure

computers in the net

Page 7: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 7

Who needs anonymity anyway?

● Very different groups● All with the same goal

anonymity needs diversity

Page 8: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 8

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 9: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 9

Anonymization concepts

● Proxy

(Source: http://www.at-mix.de )

Page 10: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 10

Anonymization concepts

● Proxy– fast– simple– single point of failure

Page 11: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 11

Anonymization concepts

● Mix

(Source: http://www.tm.uka.de/itm )

Page 12: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 12

Anonymization concepts

● Mix cascade

(Source: http://sarwiki.informatik.hu-berlin.de )

Page 13: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 13

Anonymization concepts

● MIX cascade– slow

● public key encryption● mixing

– distributed trust– one MIX secure

connection anonymous

Page 14: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 14

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 15: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 15

Tor

● The Onion Router● Open source, BSD license● TCP-overlay network● Provides SOCKS interface● Available on many platforms:

– Windows, Linux, MacOS X– FreeBSD, OpenBSD, NetBSD– Solaris, other UNIX systems

Page 16: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 16

Tor

● Aims to combine positive attributes of proxies and mixes– speed (fast)

● session keys● TCP multiplexing

– distributed trust

● Design goals: deployability, usability, flexibility, simplicity

Page 17: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 17

Tor

(Source: http://www.torproject.org )

Page 18: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 18

Tor

(Source: http://www.torproject.org )

Page 19: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 19

Tor

(Source: http://www.torproject.org )

Page 20: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 20

Tor

● Exit policies (for nodes)– control which TCP connections can exit your

node– default policy blocks SMTP, NNTP and some

others– allows the rest (HTTP, SSH...)– reject everything: middleman- or entry-node

Page 21: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 21

Tor

● Hidden Services– Services with no published IP address– Cannot be physically found– Can be provided anywhere connection to Tor

network is possible– Resist Denial of Service– Resist censorship

– Addresses: duskgytldkxiuqc6.onion

Page 22: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 22

Tor

(Source: http://www.torproject.org )

Page 23: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 23

Tor

(Source: http://www.torproject.org )

Page 24: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 24

Tor

● Legal issues– may be forbidden in some countries– crypto restrictions (Great Britain, “RIPA”)– special laws (Germany, “hacker paragraph”)– destination servers have Exit-Node IP in their

logs● node operator has to answer if there is trouble● server may get ceized (happened before)● ...

Page 25: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 25

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 26: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 26

FreeBSD

● Well suited for Tor (node) operation● Operational security

– Jails (jail(8))– Disk/swap encryption (geli(8), gbde(4))– audit(4)– mac(4) framework

● Hardware crypto(4) acceleration● Well maintained Tor-related ports

Page 27: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 27

FreeBSD

● Important ports– security/tor– security/tor-devel– www/privoxy– net-mgmt/vidalia– security/trans-proxy-tor

Page 28: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 28

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 29: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 29

What else to take care of?

● Name resolution– Some applications bypass configured proxy

(hi Firefox < version 1.5!)

● Cookies, web-bugs, referrer– Disable cookies/referrer or better use Privoxy

● Connection Exit-Node <-> Destination– Not encrypted! Use secure protocols

● Services that require registration– Tor cannot help you there

Page 30: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 30

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 31: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 31

Overview

● Who needs anonymity anyway?● Anonymization concepts● Tor● FreeBSD● What else to take care of?● Demonstration● Summary

Page 32: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 32

Summary

● Tor useful for stealthy net usage● Can be used to provide resilient services● FreeBSD a very good choice as a platform

All this very much needed inlight of recent laws etc

Tor website: http://www.torproject.org

Page 33: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 33

Questions?

Page 34: Protecting your Privacy with FreeBSD and Torbrueffer/slides/FreeBSD_Tor_MeetBSD07.pdfTor Hidden Services – Services with no published IP address – Cannot be physically found –

MeetBSD 2007 34

Thank you for your attention!