23
TOP SECRET/iCOMINT/i REL FVEY Stinks , CT SIGDEV JUN 2012 Derived From: NSA/CSSM 1-52 Dated: 20070108 Declassify On: 20370101 TOP SECRET//COMINT/f REL FVEY

Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

  • Upload
    vuhuong

  • View
    219

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECRET/iCOMINT/i REL FVEY

Stinks ,

CT SIGDEV

JUN 2012

Derived From: NSA/CSSM 1-52 Dated: 20070108

Declassify On: 20370101

TOP SECRET//COMINT/f REL FVEY

Page 2: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECRET/ICOMINT// REL FVEY

Tor Stinks....

• We will never be able to de-anonymize all Tor users all the time.

• With manual analysis we can de-anonymize a very small fraction of Tor users, however, no

success de-anonymizing a user in response to a TOPI request/on demand.

TOP SECRET//COMINT// REL FVEY

Page 3: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

REMATION II ,„

• Joint NSA GCHQ counter-Tor workshop

• Week one at MHS focus on analytics

• Week two at GCHQ focus on exploitation

https://wiki.gchqiindex.phphitle-REMATION

TOP SECRETi/COMINTll REL FVEY

Page 4: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Laundry List .

• Analytics to de-anonymize users • Exploitation — Circuit reconstruction (21) — QUANTUM attacks (1, 20, 22)

— Goes inta goes outta/low latency (2) — Existing options (8 + 11)

— Cookie leakage — Shaping (9 + 16)

— Dumb users (EPICFAIL) — Web server enabling (10)

— Node Lifespan (17) — Nodes (14)

— DNS — Degrade user experience (13 + 18)

• Technical Analysis/Research • Nodes

— Hidden services (4, 5, 6, 7) — Baseline our nodes (21)

— Timing pattern (3) — Tor node flooding

— Torservers.net/Amazon AWS

4

TOP SECRETIICOMINT/i REL FVEY

Page 5: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

Terrorist with Tor client installed

N Tor exit node

ANONYMIZER CLOUD

Tor relay node

Tor entry node A Internet site

TOP SECRET/ICOMINT// REL FVEY

Analytics: Circuit Reconstruction („is„

• Current: access to yen/ few nodes. Success rate negligible

because all three Tor nodes in the circuit have to be in the set

of nodes we have access to.

— Difficult to combine meaningfully with passive SIGINT.

• Goal: expand number of nodes we have access to

— GCHQ runs Tor nodes under NEWTONS CRADLE (how many?)

— Other partners?

— Partial reconstruction (first hops or last hops)?

TOP SECRETi/COMINTll REL FVEY

Page 6: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Analytics: Goes Inta Goes Outta/Low Latency

Find possible alternative accounts for a target: look

for connections to Tor, from the target' s

suspected country, near time of target' s activity.

• Current: GCHQ has working version (QUICKANT). R has alpha tested NSA' s version. NSA' s version produced no

obvious candidate selectors.

• Goal: Figure out if QUICKANT works, compare

methodologies. Gathering data for additional tests of NSA' s version (consistent, random and heavy user)

5

TOP SECRETi/COMINTll REL FVEY

Page 7: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Analytics: Cookie Leakage ,T551,

Use cookies to identify Tor users when they are not using Tor

• Current: preliminary analysis shows that some cookies " surv ive " Tor use. Depends on how target is using Tor (Torbutton/Tor Browser Bundle clears out cookies).

• Goal: test with cookies associated with CT targets — Idea: what if we seeded cookies to a target?

— Investigate Evercookie persistence

7

TOP SECRETIICOMINT/i REL FVEY

Page 8: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECRET/iCOMINT/i REL FVEY

Analytics: Cookie Leakage ,T„,

• DoubleclickID seen on Tor and non-Tor IPs

TOP SECRETHCOMINTH REL FVEY

Page 9: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Analytics: Dumb Users (EPICFAIL) (s„,,

GCHQ QFD that looks for Tor users when they are not using Tor.

• Current: GCHQ has working QFD based on hard selector (email, web forum, etc) but does not include cookies.

• Goal: NSA investigating own version (GREAT EXPECTATIONS) that would include cookies.

TOP SECRET/COMINTH REL FVEY

Page 10: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Analytics: Node Lifespan („„,,

How do I know WHEN a particular IP was a Tor node as opposed to IF it was a Tor node?

• Current: detection done once an hour by NTOC.

RONIN stores "last seen" and nodes age off

slowly with no accurate lifespan.

• Goal: Working with RONIN to add more details

on node lifespan.

10

Page 11: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Analytics: DNS rso)

How does Tor handle DNS requests? Are DNS requests going through Tor? Does this depend on how the target is using Tor?

• Current: Still investigating.

1 -1

TOP SECRETi/COMINTH REL FVEY

Page 12: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Technical Analysis: Hidden Services (TS/51)

What do we know about Hidden Services?

• Current: No effort by NSA, some DSD and GCHQ work on ON1ONBREATH.

• Goal: Harvest and enumerate .onion URLs

Identify similar HS based on referrer fields

Distinguish HS from normal Tor clients

12

TOP SECRET/COMINTH REL FVEY

Page 13: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECRET/ICOMINT// REL FVEY

Technical Analysis: Timing Pattern (TS/51)

Send packets back to the client that are detectable by passive accesses to find client IPs for Tor users.

• Current: GCHQ has research paper and

demonstrated capability in the lab.

• Goal: Can we expand to other owned nodes?

1 3

TOP SECRETi/COMINTll REL FVEY

Page 14: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECRET//COMINT// REL FVEY

Technical Analysis: torservers.net (Ts„ SI)

Investigate the Amazon AWS cloud instances of Tor servers. How are IPs allocated and reassigned once bandwidth limit is reached? Impact on RONIN' s ability to detect nodes?

• Current: GCHQ set up Tor nodes on the AWS cloud during REMATION II.

TOP SECRET//COMINT// REL FVEY

Page 15: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

r I STAGE 2

L

EncroteolGt7 clecluestvo

1.-10trt41.tirtt 1011 RAND

Encrypted GET iteowee to 'raboa_corn with Nr-Cookie

In the (- loaf 6E-1- Roap86-t to

-iotriu I corn writ MUID

Tor Okra I'unnl n g the Tar hrauxer handle

The :hem rrow sends trim GET

re qu.csb _ One Le Piotmoil and

oft to VdAt20] Cortcspoichnii Cookies will be serrt if stared on

the client's Iarowser

vahr.e,! -

In the clew GE! Re-quest to

rdePX,Cdrrt wA7 Y-Dsokie

STAGE I In the dear Grr bequest

wwwItermristcorn.tonst ohp Encrypted 6E7 Redo est to

wwwirrrorlst.manflaairki.php www.t error) stir: o

Wkdricattic UV re dut7t End respond wfch, a rechrettn

1-181111811 and T./heel

: ol I

A ffilaP6 VISME 661/abate WWI TOR

Tor GI exit Tct 72.1.te bkaiidic )

TOP SECRETBCOMINTH REL FVEY

Exploitation: QUANTUM (TV/S)

• QUANTUM to degrade/deny/disrupt Tor access?

• QUANTUMCOOKIE — forces clients to divulge stored cookies.

Figure 4 A cfagF_am of how th -oe QUANTUM Survey/ Cookie technique works

1 9 TOP SECRETi/COMINTll REL FVEY

Page 16: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Exploitation: Existing Options „5„5,)

Test current CNE techniques (FA and SHORTSHEET) against Torbutton and TBB users.

• Current: Torbutton and TBB prevent CNE success.

Possible success against "vanilla" Tor/Vidalia.

• Goal: modifications to initial CNE surveys? Ignore

user-agents from Torbutton or TBB? Improve

browser fingerprinting? Using javascript instead

of Flash?

Page 17: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Exploitation: Shaping (T„,,,,

• Given CNE access to a target computer can we

shape their traffic to "friendly" exit nodes?

• Route users to a separate "private" Tor network?

• Stain their traffic or user agent?

• Instruct target computer to use a service that

connects outside Tor and reveal true IP?

• Current: Can stain user agent working on shaping.

1 7

TOP SECRET/COMINTif REL FVEY

Page 18: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Exploitation: Web Server Enabling (TS/51)

Given CNE access to web server modify the server to enable a "timing/counting" attack similar to timing pattern idea.

• Current: GCHQ has a research paper and

demonstrated the technique in the lab.

18 TOP SECRET/COMINTif REL FVEY

Page 19: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Exploitation: Nodes .50

Can we exploit nodes?

Probably not. Legal and technical challenges.

19

TOP SECRETi/COMINTll REL FVEY

Page 20: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Exploitation: Degrade Tor experience (TS/51)

Given CNE access to a web server make it painful for Tor users?

Given CNE access to a network can we deny/ degrade/disrupt Tor users' ?

20

TOP SECRET/COMINTif REL FVEY

Page 21: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Nodes: Baseline Our Nodes (T„„)

How many nodes do we have cooperative or direct access to? Can we deploy similar code to these nodes to aid with circuit

reconstruction?

Can we do packet timing attacks using nodes?

Can we use the nodes to shape traffic flow?

Can we use the nodes to deny/degrade/disrupt

commis to certain sites?

TOP SECRET/COMINTif REL FVEY

Page 22: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Nodes: Tor Node Flooding ,T„„,,

Could we set up a lot of really slow Tor nodes (advertised as high bandwidth) to degrade the overall stability of the network?

TOP SECRETi/COMINTll REL FVEY

Page 23: Stinks , - American Civil Liberties Union · not using Tor • Current: preliminary analysis shows that ... Depends on how target is using Tor " (Torbutton/Tor Browser Bundle clears

TOP SECREMCOMIN17/ REL FVEY

Tor Stinks... But it Could be Worse (5/51)

• Critical mass of targets use Tor. Scaring them away from Tor might be counterproductive.

• We can increase our success rate and provide

more client IPs for individual Tor users.

• Will never get 100% but we don' t need to

provide true IPs for every target every time

they use Tor.

TOP SECRETIICOMINT/i REL FVEY