The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor....

40
Tor The Onion Router

Transcript of The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor....

Page 1: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor !

The Onion Router

Page 2: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor

Page 3: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor• A way to use the internet ‘securely'.

Page 4: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor• A way to use the internet ‘securely'.

• Secure meaning:

Page 5: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor• A way to use the internet ‘securely'.

• Secure meaning:

• Privacy

Page 6: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor• A way to use the internet ‘securely'.

• Secure meaning:

• Privacy

• Anonymity

Page 7: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor• A way to use the internet ‘securely'.

• Secure meaning:

• Privacy

• Anonymity

• Censorship circumvention

Page 8: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Most common use of Tor:

Page 9: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Who uses Tor?

Page 10: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Who uses Tor?

• Journalists

• Dissidents

• ‘Normal people’

Page 11: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Who uses Tor?

• Journalists

• Dissidents

• ‘Normal people’

Page 12: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Who uses Tor?

• Journalists

• Dissidents

• ‘Normal people’

Page 13: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Who uses Tor?

• Journalists

• Dissidents

• ‘Normal people’

Page 14: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor usage often correlates with political events:

Page 15: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

How Tor works

Page 16: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

How Tor works

Page 17: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor circuit• Alice knows everything

• The individual Tor nodes know (almost) nothing

• Circuit is valid for 10 minutes

• Bob is exposed

Page 18: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services

Page 19: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services1. Bob creates a public key

Page 20: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services1. Bob creates a public key

2. Bob creates a circuit and publishes it as his Introduction Point

Page 21: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services1. Bob creates a public key

2. Bob creates a circuit and publishes it as his Introduction Point

3. Alice creates a circuit to a Rendezvous Point

Page 22: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services1. Bob creates a public key

2. Bob creates a circuit and publishes it as his Introduction Point

3. Alice creates a circuit to a Rendezvous Point

4. Alice creates a circuit to the IP and tells Bob about the RP

Page 23: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Tor Hidden Services1. Bob creates a public key

2. Bob creates a circuit and publishes it as his Introduction Point

3. Alice creates a circuit to a Rendezvous Point

4. Alice creates a circuit to the IP and tells Bob about the RP

5. Alice and Bob meet at the RP

Page 24: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Bob

IP

AliceRP

Page 25: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Bob

IP

AliceRP

Page 26: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Bob

IP

AliceRP

Page 27: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Bob

IP

AliceRP

Page 28: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

BobAlice

Page 29: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor

Page 30: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor• Correlation attack by:

Page 31: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor• Correlation attack by:

• Being (un)lucky

Page 32: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor• Correlation attack by:

• Being (un)lucky

• Prevention by many non-adversarial nodes

Page 33: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor• Correlation attack by:

• Being (un)lucky

• Prevention by many non-adversarial nodes

• Sybil attack

Page 34: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor• Correlation attack by:

• Being (un)lucky

• Prevention by many non-adversarial nodes

• Sybil attack

• Prevention by directory authorities

Page 35: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Attacks against Tor

Page 36: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

• Censorship, e.g. in China, Iran and Kazakhstan

Attacks against Tor

Page 37: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

• Censorship, e.g. in China, Iran and Kazakhstan

• Circumvention by bridges

Attacks against Tor

Page 38: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

• Censorship, e.g. in China, Iran and Kazakhstan

• Circumvention by bridges

• Private bridges

Attacks against Tor

Page 39: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

• Censorship, e.g. in China, Iran and Kazakhstan

• Circumvention by bridges

• Private bridges

• Meek bridges (Google, Amazon, Microsoft)

Attacks against Tor

Page 40: The Onion Routerhomepages.cwi.nl/.../2014/presentations/Remi_Tor.pdf · Tor! The Onion Router. Tor. Tor ... Tor Hidden Services 1. Bob creates a public key 2. Bob creates a circuit

Demo