tor node anonymity systems requirements and … systems requirements and architecture tor node tor...

41
Anonymity Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Tor user Encrypted tunnel Unencrypted TCP Tor Node Tor Node Tor Node Exit node Entry node Middle node Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ SecAppDev, March 2013, Leuven, BE

Upload: lytu

Post on 08-Jun-2018

252 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Anonymity Systems Requirements and Architecture

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Steven J. Murdoch

http://www.cl.cam.ac.uk/users/sjm217/

SecAppDev, March 2013, Leuven, BE

Page 2: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Anonymous communications

• Anonymous communication systems allow people tocommunicate without giving away their identity (in practice, IPaddress)

• Sometimes used in their own right: e.g. for browsing the Internet• Sometimes used with other privacy enhancing technologies: e.g.

Private Information Retrieval, Anonymous credentials• One growing use is censorship resistance

Page 3: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Construction of the Internet

• Internet Service Providers (ISPs) give people access to theInternet, and allow people to host services such as websites

• ISPs connect to other ISPs so the customers of one ISP cancommunicate with those of others

• Some ISPs have international connections, others use those ofthe bigger ISPs

• ISPs are typically based in one country and governed by thelaws of that country

• Often governments control international Internet connections,either directly or via regulation

Page 4: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Construction of the Internet

Diagram: China Internet Network Information Center

Page 5: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 6: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 7: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 8: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Blocking with technology

• When a country’s government controls international connectivity,they can block requests for banned websites

• There are a number of different approaches (DNS blocking, IPaddress blocking, etc.)

• Software may be produced in-country, but often is an adaptedcommercial product

• These companies not only make the software, but provide acontinuously updated list of websites to be blocked

Page 9: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Normal web browsing

WEB BROWSER ISP INTERNET

User DNS Server DNS Server

Web Server

NORMAL WEB BROWSING (no proxy)

1. User requests www.example.org/page.html2. DNS lookup for www.example.org3. Lookup response: www.example.org is 192.0.2.1664. www.example.org is 192.0.2.1665. Get web page: www.example.org/page.html at 192.0.2.1666. Here is www.example.org/page.html

Router

1 23

45

6

normal_no proxy.indd 1 3/19/07 8:56:55 PM

Diagram: Jane Gowan

Page 10: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

DNS tampering

WEB BROWSER ISP INTERNET

User DNS Server DNS Server

Web Server

DNS TAMPERING

1. User requests www.example.org/page.html2. DNS response: www.example.org does not exist

Router

1

2

DNS_tampering.indd 1 3/19/07 8:56:18 PM

Diagram: Jane Gowan

Page 11: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

IP blocking

WEB BROWSER ISP INTERNET

User DNS Server DNS Server

Web Server

IP BLOCKING

1. User requests www.example.org/page.html2. DNS lookup for www.example.org3. Lookup response: www.example.org is 192.0.2.1664. www.example.org is 192.0.2.1665. Get web page: www.example.org/page.html at 192.0.2.1666. Router drops all packets to 192.0.2.1667. Browser concludes that www.example.org is inaccessible

Router

1 23

45

6

7

IP blocking.indd 1 3/19/07 8:56:32 PM

Diagram: Jane Gowan

Page 12: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tradeoffs in blocking systems

• DNS blocking• Easy and cheap to implement• Blocks at domain name granularity – overblocks protocols,

webpages• Trivial to bypass

• IP blocking• Easy and cheap to implement• Blocks at IP address (perhaps port) – overblocks virtual hosting

• Proxy blocking• Expensive to implement• Blocks at webpage level – low overblocking

• Hybrid blocking – IP based redirection to proxy• Tricky to get right, but cheap• Has some vulnerabilities• Blocks at webpage level – low overblocking

Page 13: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Even if a site is accessible, it may beremoved from search engine results

Searching for “Tiananmen Square” on Google.com and Google.cn

Page 14: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Limitations of blocking

• Censorship systems block legitimatecontent and fail to block bannedcontent

• It is fairly easy for readers andpublishers to circumvent thetechnical measures

• Building and maintaining censorshipsystems is expensive

• Blocking one type of contentencourages other types to beblocked

• Often the process of censorship isnot transparent

Photograph: David Gaya

Page 15: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Blocking through laws, fear, andintimidation

• ISPs may be forced to block sitesthemselves, or implementself-regulation

• People can be intimidated into nottesting rules through fear ofdetection and retribution

• These may be through laws, socialpressure or extra-legal punishment

• All these approaches may be usedat the same time, and complementeach other

Page 16: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Censorship resistance systemrequirements

• Software to resist censorship should• Hide where user is visiting (to prevent blocking)• Hide who the user is (to protect them from intimidation)

• These properties should be maintained even if the censorshipresistance system is partially compromised

Page 17: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

There are many other reasons whypeople might want privacy

• Ordinary people• To avoid personal information being sold to marketers• Protect themselves when researching sensitive topics

• Militaries and law enforcement• To carry out intelligence gathering• Protect undercover field agents• Offer anonymous tip lines

• Journalists• To protect sources, such as whistle blowers

• Human rights workers• To publicise abuses and protect themselves from surveillance• Blogging about controversial subjects

• Businesses• To observe their competition and build anonymous collaborations

Page 18: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Anonymous communication• People have to hide in a crowd of other people (“anonymity loves

company”)• The goal of the system is to make all users look as similar as

possible, to give a bigger crowd• Hide who is communicating with whom• Layered encryption and random delays hide correlation between

input traffic and output traffic

Mix

For D

For C

A

B

C

D

Kpub

Kpub

Kpriv

Page 19: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Remailers

For Mix 2

A

B

C

DFor D

Kpub 2

Mix 1

Kpriv 1

Mix 2

Kpriv 2

Mix 3

Kpriv 3

For C

Kpub 3

For Mix 3

Kpub 1

Kpub 3

Page 20: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 21: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 22: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 23: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 24: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 25: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Threshold mix

• In each round, the “threshold mix”accepts a fixed number of messages

• Once the number of messagesreaches the “batch size” the mixflushes and sends them all, in arandom order

• Other strategies are possible, butthis is the type of mix we willexamine in the exercise

• After observing one round, theattacker knows the set of sendersand receivers, but not who senteach message

Page 26: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Traffic Analysis

7%

3%

2%

9%

100%

...

• By observing traffic overmany rounds, theadversary can counteach recipient’s share ofthe messages received

• Some users will receivemore messages thanothers

• These users may be ofinterest, so the target offurther investigation

• e.g. Bob’s share is:messages received by Bobmessages received in total

over all rounds

Page 27: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tracking Alice’s Contacts

5%

2%

1%

8%

100%

...

4%

15%

20%

7%

100%

...

Alice

Alice notsending

Alicesending

Rounds when: • Can observe each Bob’sshare in both roundswhere Alice wassending, and roundswhere she was not

• Recipients whose sharejumps when Alice issending are likely Alice’sfriends

• Score = (Bob’s share inrounds where Alice issending) − (Bob’s sharein rounds where Alicenot sending)

Page 28: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Anonymity systems exist for hidingboth email and web traffic

• Hiding web traffic is a fundamentally more difficult problem thanhiding email

• Anonymity is achieved by making all traffic look the same(padding) and hiding timing correlations (delays)

• Web traffic is very variable (few kB to few GB): so paddingdoesn’t work well

• Long latencies would be intolerable for interactive traffic: soadding delays don’t work well

• However it is not all bad: anonymity needs other users to hide in• There is much more web traffic than there is email, so this

partially makes up for the lower security

Page 29: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor is a low-latency anonymity system

• Based on technology developed in the Onion Routing project• Commonly used for web browsing (works for any TCP traffic)• Originally built as a pure anonymity system (hides who is talking

to whom)• Now designed to resist censorship too (hides whether someone

is using the system at all)• Centralised directory authorities publish a list of all servers

Page 30: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Diagram: Robert Watson

Page 31: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor userTor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Page 32: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Page 33: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor uses two types of encryption

Entry Middle Exit

Data

User

1d ae cd 59 ... e4 50 de 5a ...00 02 28 be ...

Circuit encryption unlinks data entering and leaving a server

Page 34: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor uses two types of encryption

Entry Middle Exit

Data

User

1d ae cd 59 ... e4 50 de 5a ...00 02 28 be ...

Circuit encryption unlinks data entering and leaving a serverLink encryption (TLS) disguises individual circuits

Page 35: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Tor uses two types of encryption

Entry Middle Exit

Data

User

1d ae cd 59 ... e4 50 de 5a ...00 02 28 be ...

Circuit encryption unlinks data entering and leaving a serverLink encryption (TLS) disguises individual circuitsBut data rate is unchanged so traffic analysis can correlate flows

Page 36: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Architectural options: traffic analysisresistance

Resisting traffic analysis comes with a cost• It requires either long delays, lots of padding, dropping

messages, or some combination of these• Even performing these steps is not sufficient against an

adversary who can infiltrate the network• Delays are used for email anonymous communication systems

(e.g. MixMinion and MixMaster)• Padding and dropping are not used in any widely deployed

system• Tor gains resistance by being well used and widely distributed

Page 37: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Architectural options: topology

Free Route Stratified Stratifed Restricted Cascade

Choosing how nodes can connect to other nodes affects:

• Performance• Security• Scalability

Page 38: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Architectural options: path selection

Different anonymity systems take different approaches to pathselection

• Tor and remailers have a central database and source routing• Implementation is easier• Central database is a point of vulnerability

• P2P systems let nodes choose next hop on path• Reduces resistance to compromised nodes• Other attacks become possibl

Page 39: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Freenet is an anonymous contentdistribution network

• While Tor allows access to theInternet, Freenet creates a privatenetwork

• Users can create websites, sharefiles and send/receive emailsbetween other members of thenetwork

• Content is hosted by sharing itamongst users of the network

• Users cannot select what contentthey host, and it is stored in anencrypted form

Page 40: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Psiphon a is censorship resistancesystem with different tradeoffs to Tor

• There is no centralized control, so itis hard to block but also hard foruser to find a server

• Users do not have to downloadsoftware, but this limits the strengthof protection

• If the user cannot modify browsersettings or install software, Psiphonis still usable

• Users within a censored country canask someone they trust outside ofthe country to install the Psiphonserver

Page 41: Tor Node Anonymity Systems Requirements and … Systems Requirements and Architecture Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server

Further information

“Tools and Technology of Internet Filtering”, achapter in “Access Denied”.http://opennet.net/accessdenied

“Security Engineering”, 2nd Edition (Chapter 23).http://www.cl.cam.ac.uk/~rja14/book.html

The anonymity bibliographyhttp://www.freehaven.net/anonbib/

The Tor Project websitehttps://www.torproject.org/

A copy of these slides will be availablehttp://www.cl.cam.ac.uk/~sjm217/