runa a. sandvik [email protected] 12 september 2011 · online anonymity software and network open...

51
Tor: Online anonymity, privacy, and security. Runa A. Sandvik [email protected] 12 September 2011 Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 1 / 38

Upload: others

Post on 25-Sep-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor: Online anonymity, privacy, and security.

Runa A. [email protected]

12 September 2011

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 1 / 38

Page 2: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

About Runa

Studied at the Norwegian University of Science and Technology

Worked for the Tor Project during Google Summer of Code in 2009

Developer, security researcher, translation coordinator

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 2 / 38

Page 3: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What are we talking about?

Crash course on anonymous communications

Quick overview of Tor

Tor and circumvention

Future work

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 3 / 38

Page 4: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

The Tor Project, Inc.

501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 4 / 38

Page 5: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is anonymity?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 5 / 38

Page 6: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Threat model: what can the attacker do?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 6 / 38

Page 7: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Threat model: what can the attacker do?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 6 / 38

Page 8: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Threat model: what can the attacker do?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 6 / 38

Page 9: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t cryptography

Cryptography protects the contents in transit

You still know who is talking to whom, how often, and how muchdata is sent.

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 7 / 38

Page 10: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t steganography

Attacker can tell Alice is talking to someone, how often, and how muchdata is sent.

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 8 / 38

Page 11: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 12: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 13: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 14: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 15: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 16: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity isn’t just wishful thinking...

”You can’t prove it was me!”

”Promise you won’t look”

”Promise you won’t remember”

”Promise you won’t tell”

”I didn’t write my name on it!”

”Isn’t the Internet already anonymous?”

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 9 / 38

Page 17: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymous communication

People have to hide in a crowd of other people (”anonymity lovescompany”)

The goal of the system is to make all users look as similar as possible,to give a bigger crowd

Hide who is communicating with whom

Layered encryption and random delays hide correlation between inputtraffic and output traffic

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 10 / 38

Page 18: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Anonymity serves different interests for different usergroups

Private citizens: it’s privacy

Businesses: it’s network security

Governments: it’s traffic-analysis resistance

Human rights activists: it’s reachability

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 11 / 38

Page 19: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is Tor?

Online anonymity software and network

Open source, freely available (3-clause BSD license)

Active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

Funding from US DoD, EFF, Voice of America, Google, NLNet,Human Rights Watch

Increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, GetTor, Thandy, Orbot, Tor Check, Arm,Torouter, Tor Cloud and more

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 12 / 38

Page 20: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is Tor?

Online anonymity software and network

Open source, freely available (3-clause BSD license)

Active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

Funding from US DoD, EFF, Voice of America, Google, NLNet,Human Rights Watch

Increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, GetTor, Thandy, Orbot, Tor Check, Arm,Torouter, Tor Cloud and more

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 12 / 38

Page 21: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is Tor?

Online anonymity software and network

Open source, freely available (3-clause BSD license)

Active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

Funding from US DoD, EFF, Voice of America, Google, NLNet,Human Rights Watch

Increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, GetTor, Thandy, Orbot, Tor Check, Arm,Torouter, Tor Cloud and more

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 12 / 38

Page 22: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is Tor?

Online anonymity software and network

Open source, freely available (3-clause BSD license)

Active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

Funding from US DoD, EFF, Voice of America, Google, NLNet,Human Rights Watch

Increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, GetTor, Thandy, Orbot, Tor Check, Arm,Torouter, Tor Cloud and more

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 12 / 38

Page 23: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

What is Tor?

Online anonymity software and network

Open source, freely available (3-clause BSD license)

Active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

Funding from US DoD, EFF, Voice of America, Google, NLNet,Human Rights Watch

Increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TAILS Anonymous OperatingSystem, Tor Weather, GetTor, Thandy, Orbot, Tor Check, Arm,Torouter, Tor Cloud and more

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 12 / 38

Page 24: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

How is Tor different from other systems?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 13 / 38

Page 25: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

How is Tor different from other systems?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 13 / 38

Page 26: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

How is Tor different from other systems?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 13 / 38

Page 27: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor uses a simple centralized directory protocol

Relays publish self-signed descriptors to directory authorities

Authorities publish a consensus list of all relay descriptors

Clients download latest consensus from a directory authority or adirectory cache

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 14 / 38

Page 28: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Bridges versus relays

A step forward in the blocking resistance race

Bridge relays (or ”bridges” for short) are Tor relays that aren’t listedin the main Tor directory

To use a bridge, you will need to locate one first (can be done usingbridges.torproject.org, email, social media etc)

A bridge will act as the first hop in the circuit

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 15 / 38

Page 29: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Hidden services

Tor makes it possible for users to hide their locations while offeringvarious kinds of services, such a website or an im server

Using Tor ”rendezvous points,” other Tor users can connect to thesehidden services, each without knowing the other’s network identity

A hidden service will have an address that ends in .onion, e.g.http://duskgytldkxiuqc6.onion/

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 16 / 38

Page 30: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Encryption

Tor uses the 128-bit AES cipher in counter mode to generate a cipherstream

And the signing keys are 1024-bit RSA

We used to use a 1024-bit safe prime from RFC 2409, section 6.2 asthe DH parameter...

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 17 / 38

Page 31: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 18 / 38

Page 32: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 19 / 38

Page 33: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Encryption

But then we made the DH parameter we use for TLS match the onefrom Apache’s mod ssl...

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 20 / 38

Page 34: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 21 / 38

Page 35: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 22 / 38

Page 36: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Keys

Each relay maintains a long-term identity key and a short term onionkey:

I The identity key is used to sign relay descriptorsI The directory authorities also use the identity key to sign the consensusI The onion key is used to decrypt requests from clients to set up a

circuit and negotiate ephemeral keysI The TLS protocol also establishes a short-term link key when

communicating between relays

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 23 / 38

Page 37: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Cells

Traffic passes along circuits in the Tor network in fixed-size cells (512bytes):

I The header includes a circuit identifier that specifies which circuit thecell refers to

I The command describes what to do with the cells payloadI The entire contents of the header and payload is encrypted/decrypted

together as the relay cell moves along the circuit

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 24 / 38

Page 38: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor on the wire

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 25 / 38

Page 39: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

How many people use Tor daily?

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 26 / 38

Page 40: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Attackers can block access to the network

By blocking access to the directory authorities

By blocking access to all the relays in the network

By blocking access to all known bridges in the network

By preventing users from finding the software

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 27 / 38

Page 41: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in China

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 28 / 38

Page 42: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in China

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 29 / 38

Page 43: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in Egypt

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 30 / 38

Page 44: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in Egypt

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 31 / 38

Page 45: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in Libya

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 32 / 38

Page 46: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Tor and circumvention in Libya

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 33 / 38

Page 47: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Future work, part 1

The Torouter project: hardware project to provide an easy to setupTor bridge or relay

The Tor Cloud project: provides bridge-by-default and relay-by-defaultimages for Amazon EC2

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 34 / 38

Page 48: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Future work, part 2

Pluggable transports: a plug-in system that can evade manycensorship systems by disguising Tor traffic as, for example, standardHTTP traffic

Obfuscated proxy: protocol obfuscation for TCP protocols preventthird party from identifying protocol based on message contents

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 35 / 38

Page 49: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Future work, part 3

Censorship resistance research: reachability testing of the Tor networkfrom within certain countries

IPv6: goal for Tor 0.2.3.x is for bridges to handle IPv6-only clientsand exits can handle IPv6 addresses

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 36 / 38

Page 50: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Time for a demo

Demonstration of Tor Browser Bundle

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 37 / 38

Page 51: Runa A. Sandvik runa@torproject.org 12 September 2011 · Online anonymity software and network Open source, freely available (3-clause BSD license) Active research environment: Rice,

Questions?

[email protected]://www.torproject.org/

Runa A. Sandvik [email protected] () Tor: Online anonymity, privacy, and security. 12 September 2011 38 / 38