Anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1.

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

Tor: The Second-Generation Onion Router
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
CSE 461: Privacy Ben Greenstein Jeremy Elson TAs: Ivan and Alper.
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
I NTERNET A NONYMITY By Esra Erdin. Introduction Types of Anonymity Systems TOR Overview Working Mechanism of TOR I2P Overview Working Mechanism of I2P.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Modelling and Analysing of Security Protocol: Lecture 9 Anonymous Protocols: Theory.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002
CS335 Networking & Network Administration Tuesday, April 20, 2010.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
A Tale of Research: From Crowds to Deeper Understandings Matthew Wright Jan. 25, : Adv. Network Security.
CSCI 5234 Web Security1 Privacy & Anonymity in the WWW Ch. 12, Oppliger.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Anonymity on the Internet Presented by Randy Unger.
1 Network Security Lecture 8 IP Sec Waleed Ejaz
Privacy: anonymous routing, mix nets (Tor), and user tracking.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Chapter 14 Network Encryption
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
science/internet-intro
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
K. Salah1 Security Protocols in the Internet IPSec.
Draft-carpenter-v6ops-label-balance-02 Brian Carpenter Sheng Jiang (Speaker) Willy Tarreau March 2012 IPv6 Flow Label for Server Load Balancing - update.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
anonymous routing and mix nets (Tor)
Securing the Network Perimeter with ISA 2004
Anonymous Communication
What's the buzz about HORNET?
0x1A Great Papers in Computer Security
Anonymous Communication
Anonymous Communication
Presentation transcript:

anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1

Anonymous web browsing  Why? 1. Discuss health issues or financial matters anonymously 2. Bypass Internet censorship in parts of the world 3. Conceal interaction with gambling sites 4. Law enforcement  Two goals: ▹ Hide user identity from target web site: (1), (4) ▹ Hide browsing pattern from employer or ISP: (2), (3)  Stronger goal: mutual anonymity (e.g. r ers) 2

Current state of the world I  ISPs tracking customer browsing habits: ▹ Sell information to advertisers ▹ Embed targeted ads in web pages (1.3%) »Example: MetroFi (free wireless) [Web Tripwires: Reis et al. 2008]  Several technologies used for tracking at ISP: ▹ NebuAd, Phorm, Front Porch ▹ Bring together advertisers, publishers, and ISPs »At ISP: inject targeted ads into non-SSL pages  Tracking technologies at enterprise networks: ▹ Vontu (symantec), Tablus (RSA), Vericept 3

Current state of the world II  EU directive 2006/24/EC: 3 year data retention ▹ For ALL traffic, requires EU ISPs to record: »Sufficient information to identify endpoints (both legal entities and natural persons) »Session duration … but not session contents ▹ Make available to law enforcement »… but penalties for transfer or other access to data  For info on US privacy on the net: ▹ “privacy on the line” by W. Diffie and S. Landau 4

Part 1: network-layer privacy Goals: Hide user’s IP address from target web site Hide browsing destinations from network

1 st attempt: anonymizing proxy 6 anonymizer.com ? URL=target User 1 User 2 User 3 anonymizer.com Web 1 Web 2 Web 3 SSL HTTP

Anonymizing proxy: security  Monitoring ONE link: eavesdropper gets nothing  Monitoring TWO links: ▹ Eavesdropper can do traffic analysis ▹ More difficult if lots of traffic through proxy  Trust: proxy is a single point of failure ▹ Can be corrupt or subpoenaed »Example: The Church of Scientology vs. anon.penet.fi  Protocol issues: ▹ Long-lived cookies make connections to site linkable 7

How proxy works  Proxy rewrites all links in response from web site ▹ Updated links point to anonymizer.com »Ensures all subsequent clicks are anonymized  Proxy rewrites/removes cookies and some HTTP headers  Proxy IP address: ▹ if a single address, could be blocked by site or ISP ▹ anonymizer.com consists of >20,000 addresses »Globally distributed, registered to multiple domains »Note: chinese firewall blocks ALL anonymizer.com addresses  Other issues: attacks (click fraud) through proxy 8

2 nd Attempt: MIX nets Goal: no single point of failure

MIX nets [Chaum’81]  Every router has public/private key pair ▹ Sender knows all public keys  To send packet: ▹ Pick random route: R2  R3  R6  srvr ▹ Onion packet: 10 E pk 2 ( R 3, E pk 3 ( R 6, R3R3 R5R5 R4R4 R1R1 R2R2 R6R6 E pk 6 ( srvr, msg) msg srvr

Eavesdropper’s view at a single MIX  Eavesdropper observes incoming and outgoing traffic  Crypto prevents linking input/output pairs ▹ Assuming enough packets in incoming batch ▹ If variable length packets then must pad all to max len  Note: router is stateless 11 user 1 user 2 user 3 RiRi batch

Performance  Main benefit: ▹ Privacy as long as at least one honest router on path  Problems: ▹ High latency (lots of public key ops) »Inappropriate for interactive sessions »May be OK for (e.g. Babel system) ▹ No forward security 12 R3R3 R2R2 R6R6 srvr

3 rd Attempt: Tor MIX circuit-based method Goals:privacy as long as one honest router on path, and reasonable performance

The Tor design  Trusted directory contains list of Tor routers  User’s machine preemptively creates a circuit ▹ Used for many TCP streams ▹ New circuit is created once a minute 14 R1R1 R2R2 R3R3 R4R4 srvr 1 srvr 2 R5R5 R6R6 stream 1 stream 2 one minute later

Creating circuits 15 R1R1 R2R2 TLS encrypted Create C 1 D-H key exchange K1K1 K1K1 Relay C 1 Extend R 2 D-H key exchange K2K2 K2K2 Extend R 2

Once circuit is created  User has shared key with each router in circuit  Routers only know ID of successor and predecessor 16 R1R1 R2R2 R3R3 R4R4 K 1, K 2, K 3, K 4 K1K1 K2K2 K3K3 K4K4

Sending Data 17 R1R1 R2R2 Relay C 1 Begin site:80 Relay C 2 Begin site:80 TCP handshake Relay C 1 data HTTP GET Relay C 2 data HTTP GET HTTP GET K1K1 K2K2 resp Relay C 2 data resp Relay C 1 data resp

Complete View 18

Properties  Performance: ▹ Fast connection time: circuit is pre- established ▹ Traffic encrypted with AES: no pub-key on traffic  Tor crypto: ▹ provides end-to-end integrity for traffic ▹ Forward secrecy via TLS  Downside: ▹ Routers must maintain state per circuit ▹ Each router can link multiple streams via CircuitID »all steams in one minute interval share same CircuitID 19

Privoxy  Tor only provides network level privacy ▹ No application-level privacy »e.g. mail progs add “From: -addr” to outgoing mail  Privoxy: ▹ Web proxy for browser-level privacy ▹ Removes/modifies cookies ▹ Other web page filtering 20

Anonymity attacks: watermarking  Goal: R 1 and R 3 want to test if user is communicating with server  Basic idea: ▹ R 1 and R 3 share sequence:  1,  2, …,  n  {-10,…,10} ▹ R 1 : introduce inter-packet delay to packets leaving R 1 and bound for R 2. Packet i delayed by  i (ms) ▹ Detect signal at R 3 21 R1R1 R2R2 R3R3

Anonymity attacks: congestion  Main idea: R 8 can send Tor traffic to R 1 and measure load on R 1  Exploit: malicious server wants to identify user ▹ Server sends burst of packets to user every 10 seconds ▹ R 8 identifies when bursts are received at R 1 Follow packets from R 1 to discover user’s ID 22 R1R1 R2R2 R3R3 R8R8