A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie.

Slides:



Advertisements
Similar presentations
SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.
Advertisements

SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Tor: The Second-Generation Onion Router
How Many Ways Can You Connect To The Internet?
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery Amihay Vinter.
Onion Routing Security Analysis Aaron Johnson U.S. Naval Research Laboratory DC-Area Anonymity, Privacy, and Security Seminar.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Introduction to the Internet How did the Internet start? Why was the Internet developed? How does Internet handle the traffic? Why WWW changed the Internet.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Data Communications and Networks
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Fundamental of IP network ~ ping, traceroute ~ Practice 1 Information and Communications Technology Internet Engineering.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Jeremy Clark 1, P.C. van Oorschot 2, and Carlisle Adams 1 Presented by Jeremy Clark Usability of Anonymous Web Browsing: An Examination of Tor Interfaces.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
CTC228 Nov Today... Catching up with group projects URLs and DNS Nmap Review for Test.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
6to4
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Anonymous Internet Protocols
CS590B/690B Detecting Network Interference (Fall 2016)
CS590B/690B Detecting Network Interference (FALL 2016)
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Exercise ?: TOR.
Privacy Through Anonymous Connection and Browsing
* Essential Network Security Book Slides.
0x1A Great Papers in Computer Security
Anupam Das , Nikita Borisov
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Computer communications
Protocol Application TCP/IP Layer Model
Anonymous Communication
Presentation transcript:

A Usability Evaluation of the Tor Anonymity Network By Gregory Norcie

What is Tor? An onion routing protocol originally sponsored by the US Naval Research Laboratory From 2004 to 2006 was supported by EFF Since 2006 has been it’s own 501(c)(3) nonprofit Image courtesy indymedia.de

Q: What is an onion routing protocol? A: Like a proxy. But better.

So How Does an Onion Routing Protocol Work? The user creates a “circuit” leading to their destination. At each hop, the node “unwraps” a layer from the packet via symmetric keys, revealing the next destination. Full technical details:

Image courtesy torproject.org

Photo courtesy Wikimedia Commons

So Why Use Tor? Law enforcement uses Tor to visit target websites without leaving government IP addresses in their web log, and for security during sting operations. Whistleblowers use Tor to anonymously contact media organizations Dissidents use Tor to get outside information in oppresive regimes.

Real Life Example: 2009 Iranian Presidential Election All Western Media deported or sequestered in hotels Internet Filtering of popular social networking sites (twitter, facebook, youtube, etc) US State Dept asks twitter to delay maintenance (( iddleeast/17media.html?_r=1)

Case in point: The Death of Neda Agha-Soltan Video of unarmed protester fatally shot by Basij militia Video uploaded to youtube, shared via twitter. #neda becomes trending topic on twitter Photo Courtesy Wikimedia Commons

So How Do I Use Tor? Option 1: Command line Option 2: GUI We of course, want to use option 2. Example of Tor controlled via GUI: Torbutton

Torbutton: Designed for Usability

Photo courtesy Wikimedia Commons

Tor is Not Perfect

The 3 Traditional Threats to Tor's Security: DNS Leaks Traffic Analysis Malicious Exit Nodes

Threat 1: DNS Leaks DNS requests not sent through Tor network by default Attacker could see what websites are being visited external software such as Foxyproxy and Privoxy can be used to route DNS requests through tor network, but this is _not_ default behavior

Threat 2: Traffic Analysis "Traffic-analysis is extracting and inferring information from network meta-data, including the volumes and timing of network packets, as well as the visible network addresses they are originating from and destined for." Tor is a low latency network, and thus is vulnerable to an attacker who can see both ends of a connection Further reading: Low Cost Traffic Analysis of Tor: ( pers/oakland05torta.pdf)

Threat 3: Rogue Exit Nodes Traffic going over Tor is not encrypted, just anonymous Malicious exit node can observe traffic Swedish researcher Dan Egerstad obtained s from embassies belonging to Australia, Japan, Iran, India and Russia, publishes them on the net. Sydney Morning Herald called it “hack of the year” in interview with Egerstad

Additional Reading Tor design document: paper/tor-design.html Usability of Anonymous web browsing: an examination of Tor Interfaces and deployability Clark, J., van Oorschot, P. C., and Adams, C ( Article in Wired on Malicious exit nodes: Dan Egerstad Interview: (One of first to widely publish on malicious exit nodes): year/2007/11/12/ html?page=fullpage#contentSwap1 Low-Cost Traffic Analysis of Tor: Why Tor is Slow and What We're Doing About It:

Something to Think About: "A hard-to-use system has fewer users — and because anonymity systems hide users among users, a system with fewer users provides less anonymity. Usability is thus not only a convenience: it is a security requirement" -Tor Design Document

#1 Tor Usability Issue: TOR IS SLOW Example: TCP backoff slows down every circuit at once. “Tor combines all the circuits going between two Tor relays into a single TCP connection. Smart approach in terms of anonymity, since putting all circuits on the same connection prevents an observer from learning which packets correspond to which circuit. Bad idea in terms of performance, since TCP’s backoff mechanism only has one option when that connections sending too many bytes: slow it down, and thus slow down all the circuits going across it. This is only one subpart of one section of a 27 page paper entitled “Why Tor is Slow and What We're Doing About It”. Photo courtesy Wikimedia Commons