Download presentation
Presentation is loading. Please wait.
1
Tor Bruce Maggs relying on materials from http://www.torproject.org
2
2
3
How Tor Works 3
4
4
5
5
6
Encryption Keys in TOR Each relay has a long-term ``identity’’ public/private key pair used to sign TLS certificates (public keys signed by directory) Medium-term (one week) public/private ``onion’’ keys are used to decrypt requests to extend circuits – so first node can’t spoof the whole path Short-term “connection” keys used to negotiation TLS connections 6
7
How Tor Works 7
8
Bridge Relays (a.k.a. Bridges) Some ISPs/governments block all traffic to relays that appear in the Tor directory. Bridges are relays that don’t appear in the directory. User has to solve the problem of finding a bridge. 8
9
Solve a Captcha to get Bridge Address 9
10
10
11
Growth of Tor Network 11
12
Growth of Tor Network 12
13
Spike in Number of Users 13
14
Possible Explanation for Spike Botnet “Mevade.A” a.k.a. “Sefnit” a.k.a. “SBC” is using Tor for connectivity http://blog.fox-it.com/2013/09/05/large- botnet-cause-of-recent-tor-network- overload/ 14
15
15
16
Tor Exit Nodes See Plaintext! 16 http://archive.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=all
17
Tor Browser 17
18
Tor Browser 18
19
19
20
Tor-Aware Web Servers 20 Connect directly to Tor, do not advertise their network addresses.
21
Establishing a Hidden Service 21
22
Establishing a Hidden Service 22
23
Finding a Hidden Service 23
24
Contacting a Hidden Service 24
25
Contacting a Hidden Service 25
26
Communicating with a Hidden Service 26
27
Using Tor as a SOCKS5 Proxy Can tunnel any TCP connection through Tor (and DNS requests) First run the Tor browser, it will also act as a SOCKS5 proxy and accept connections Configure your application, e.g., chat, to use 127.0.0.1 as SOCKS5 proxy 27
28
Configure HexChat to use Proxy 28
29
Now Chatting through Tor 29
30
4 30
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.