71
1 The Tor Project, Inc. Our mission is to be the global resource for technology, advocacy, research and education in the ongoing pursuit of freedom of speech, privacy rights online, and censorship circumvention.

The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

  • Upload
    ngonga

  • View
    254

  • Download
    7

Embed Size (px)

Citation preview

Page 1: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

1

The Tor Project, Inc.

Our mission is to be the global resource for technology, advocacy, research and

education in the ongoing pursuit of freedom of speech, privacy rights online, and

censorship circumvention.

Page 2: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

2

What is Tor?

Online anonymity 1) open source software, 2) network, 3) protocolCommunity of researchers, developers, users, and relay operatorsFunding from US DoD, Electronic Frontier Foundation, Voice of America, Google, NLnet, Human Rights Watch, NSF, US State Dept, SIDA, Knight Foundation, ...

Page 3: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

3

U.S. 501(c)(3) non-profit organization dedicated to the research and development of tools for online anonymity and privacy

The Tor Project, Inc.

Page 4: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

4

Estimated ~800,000? daily Tor users

Page 5: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

5

Threat model:what can the attacker do?

AliceAnonymity network Bob

watch (or be!) Bob!

watch Alice!

Control part of the network!

Page 6: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

6

Anonymity isn't encryption: Encryption just protects contents.

Alice

Bob

“Hi, Bob!”“Hi, Bob!” <gibberish>

attacker

Page 7: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

7

Anonymity isn't just wishful thinking...“You can't prove it was me!”

“Promise you won't look!”

“Promise you won't remember!”

“Promise you won't tell!”

“I didn't write my name on it!”

“Isn't the Internet already anonymous?”

Page 8: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

8

Anonymity serves different interests for different user groups.

Anonymity

Private citizens“It's privacy!”

Page 9: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

9

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Businesses

“It's network security!”

“It's privacy!”

Page 10: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

10

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Governments Businesses

“It's traffic-analysisresistance!”

“It's network security!”

“It's privacy!”

Page 11: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

11

Anonymity serves different interests for different user groups.

Anonymity

Private citizens

Governments Businesses

“It's traffic-analysisresistance!”

“It's network security!”

“It's privacy!”

Human rightsactivists

“It's reachability!”

Page 12: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

12

The simplest designs use a single relay to hide connections.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

Relay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

(example: some commercial proxy providers)

Page 13: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

13

But a single relay (or eavesdropper!) is a single point of failure.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

EvilRelay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

Page 14: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

14

... or a single point of bypass.

Bob2

Bob1

Bob3

Alice2

Alice1

Alice3

IrrelevantRelay

E(Bob3,“X”)

E(Bob1, “Y”)

E(Bob2, “Z”)

“Y”

“Z”

“X”

Timing analysis bridges all connections through relay ⇒ An attractive fat target

Page 15: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

15

So, add multiple relays so thatno single one can betray Alice.

BobAlice

R1

R2

R3

R4 R5

Page 16: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

16

Alice makes a session key with R1...And then tunnels to R2...and to R3

BobAlice

R1

R2

R3

R4 R5

Bob2

Page 17: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

17

Page 18: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

18

Page 19: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

19

Page 20: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

20

Tor Controller Interface

● stem● pytorctl● jtorctl● txtorcon

Page 21: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

21

Tor specs

Page 22: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

22

freehaven.net/anonbib/

Page 23: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

23

Tor network simulators

● Shadow● ExperimenTor● Chutney● Puppetor

Page 24: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

24

Page 25: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

25

Page 26: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

26

Page 27: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

27

Attackers can block users from connecting to the Tor network

1) By blocking the directory authorities2) By blocking all the relay IP addresses in the directory, or the addresses of other Tor services3) By filtering based on Tor's network fingerprint4) By preventing users from finding the Tor software (usually by blocking website)

Page 28: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

28

Relay versus Discovery

There are two pieces to all these “proxying” schemes:

a relay component: building circuits, sending traffic over them, getting the crypto right

a discovery component: learning what relays are available

Page 29: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

29

R4

R2

R1

R3

Bob

Alice

Alice

Alice

Alice

Alice

BlockedUser

BlockedUser

BlockedUser

BlockedUser

BlockedUser

Alice

AliceAlice

Alice

Alice

Alice

Alice

Alice

AliceAlice

Page 30: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

30

Page 31: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

31

Page 32: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

32

Page 33: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

33

Page 34: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

34

Page 35: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

35

Page 36: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

36

Page 37: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

37

Page 38: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

38

Page 39: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

39

Page 40: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

40

Page 41: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

41

Page 42: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

42

Page 43: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

43

What we're up against

Govt firewalls used to be stateless. Now they're buying fancier hardware.Burma vs Iran vs ChinaNew filtering techniques spread by commercial (American) companies :(

Page 44: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

44

Page 45: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

45

Page 46: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

46

Modularity

Page 47: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

47

Pluggable transports

● Flashproxy (Stanford), websocket● FTEProxy (Portland St), http via regex● Stegotorus (SRI/CMU), http● Skypemorph (Waterloo), Skype video● uProxy (Google), webrtc● Lantern (BNS), social network based● ScrambleSuit (Karlstad), obfs-based● Telex (Michigan/Waterloo), traffic divert

Page 48: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

48

Tor's safety comes from diversity

● #1: Diversity of relays. The more relays we have and the more diverse they are, the fewer attackers are in a position to do traffic confirmation. (Research problem: measuring diversity over time)

● #2: Diversity of users and reasons to use it. 50000 users in Iran means almost all of them are normal citizens.

Page 49: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

49

Tor's anonymity comes from...

● The first 100,000 users (user diversity)● The last 1,000,000 users (end-to-end

correlation resistance)● The first 1,000 relays (location diversity)

Page 50: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

50

Only a piece of the puzzleAssume the users aren't attacked by their hardware and softwareNo spyware installed, no cameras watching their screens, etcUsers can fetch a genuine copy of Tor?

Page 51: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

51

Page 52: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

52

Page 53: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

53

“Still the King of high secure,low latency Internet Anonymity”

Contenders for the throne:● None

Page 54: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

54

NSA/GCHQ programs that affect Tor

● Quick Ant (QFD), Quantum Insert, Foxacid● Quantum for cookie tests (good thing we

moved away from Torbutton's “toggle”)● Remember, they can do these things even

more easily to non-Tor users● At least they can't target specific Tor users

(until they identify themselves)● “Don't worry, we never attack Americans” (!)

Page 55: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

55

Perception

● DoJ's aborted study finding 3% bad content on the Tor network

● How do you compare one Snowden leak to ten true reviews on Yelp?

● BBC's Silk Road articles telling people how to buy drugs safely

Page 56: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

56

Page 57: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

57

Page 58: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

58

Page 59: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

59

High-profile hidden services

The media has promoted a few hot topics:● WikiLeaks (~2010)● Farmer's market (pre-2013)● Freedom Hosting (2013)● Silk Road (2013)

There are many more (eg: many GlobaLeaks deployments, etc) which aren't well known by the media (yet).

Page 60: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

60

So what should Tor's role in the world be?

● Can't be solely technical (anymore, if it ever could have been)

● But technical is what we're best at (at least, historically)

● Remember how important diversity of users is

Page 61: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

61

Three ways to destroy Tor

● 1) Legal / policy attacks● 2) Make ISPs hate hosting exit relays● 3) Make services hate Tor connections

– Yelp, Wikipedia, Google, Skype, …

Page 62: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

62

Page 63: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

63

Botnet● Some jerk in the Ukraine signed up 5

million bots as Tor clients (not relays)● Our scalability work paid off!● Good thing it wasn't malicious.● Ultimately it didn't work: everybody

noticed, and Microsoft has been cleaning up the bots

Page 64: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

64

Number of daily Tor users

Page 65: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

65

So what's next?

● “Tor: endorsed by Egyptian activists, Wikileaks, NSA, GCHQ, Chelsea Manning, Snowden, ...”

● Different communities like Tor for different reasons.

Page 66: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

66

Page 67: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

67

Tor Browser Bundle 3.x

● Deterministic Builds● “Tor launcher” extension, no Vidalia● Asks if you want bridges first● Local homepage, so much faster startup● Security slider (for e.g. JavaScript)● Privacy fixes, e.g. font enumeration

Page 68: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

68

Page 69: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

69

Orbot

Page 70: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

70

Tails LiveCD

Page 71: The Tor Project, Inc. · The Tor Project, Inc. ... NSA/GCHQ programs that affect Tor ... Tor Browser Bundle,

71

“Core” Tor tasks

● Core Tor (specs, design, hidden services)● Tor Browser Bundle, deterministic builds● Metrics and measurements● Bridges and pluggable transports● Helping the research community● Outreach and education