Download presentation
Presentation is loading. Please wait.
Published byBathsheba Barrett Modified over 6 years ago
1
CS590B/690B Detecting Network Interference (Fall 2016)
Lecture 13 Phillipa Gill – Umass Amherst
2
Last time Fingerprinting filtering products Questions?
3
Review questions What is the meaning of “dual use technology” (in the context of filtering products)? How can we learn about what products to suspect in a given network? How can we validate that a given product is installed on a specific IP address? How can we verify that a specific product is being used for censorship? What factors make this challenging? Filtering products can be used in enterprise/academic networks vs. for national censorship User reports, logos on block pages What web Create bogus domains/submit them to the product’s Web site Need to know what categories of content the ISP is blocking. Need to create sites matching that content for submission
4
Today Onion routing Tor (an implementation of onion routing)
Slides by Roger Dingledine (via Jonathan Katz) df lectures/Module5.pdf
5
What is anonymity Informally: You can’t tell who did what
Who wrote this blog post? Who’s been viewing my Web pages? Who’s been ing patent attorneys? Formally: Indistinguishability within an “anonymity set”
6
Anonymity Can’t distinguish? Anonymity set size? Probability distribution within anonymity set?
7
Assumptions… We have to make some assumptions about what the attacker can do
8
Anonymity != Confidentiality
Encryption does not give anonymity. It just protects the contents
9
Why do we care about anonymity?
10
Why anonymity? Regular citizens don’t want to be tracked
People around the world experience censored Internet Their speech on the Internet is also censored… … can lead to arrest, persecution, or worse Not just for dissidents… … if you write something bad about your employer you could be fired Law enforcement needs it too Investigating a suspect: why is alice.fbi.gov reading my Web page? Sting operation: why is alice.fbi.gov selling counterfeits on ebay? Corporations Are your employees reading a competitor’s jobs page? Government Hide list of IPs in Baghdad receiving .gov (untrusted ISP) What does the CIA Google for? (untrusted service)
11
Can’t be anonymous by yourself
… anonymity loves company
12
Can’t be anonymous by yourself
… anonymity loves company
13
Simple anonymity design
14
But an attacker who sees alice can see who she talks to
15
So add encryption
16
But the relay is a single point of failure
17
Also single point to bypass
18
Solution: multiple relays
19
Can tell Alice is talking but not to Whom
20
Can tell someone is talking to bob but not who it is
21
How it works
22
How it works
23
How it works
24
How it works
25
How it works
26
Tor: The Big picture Freely available (open source)
Comes with spec + documentation, translated into 15+ languages Several commercial imitators Focus on usability/scalability/incentives 200,000+ active users including gov’t/law enforcement Began in 1995 Now a 501 (c ) 3 with a handful of employees and many volunteers Volunteers run relays, have options to configure traffic load Issues with being responsible for the traffic exiting from exit nodes
27
Weaknesses/Attacks Eavesdropping AS
AS on path between source and entry node + exit node and destination Applications that leak IP address (technically not something Tor protects against) Bad apple attack Use leaked IP + analyze traffic patterns to deanonymize users Run an exit node and eavesdrop DoS Carefully execute commands to exhaust resources on a relay
28
Stats about Tor
29
Related anonymity systems
Reading presentation: Aqua
30
Hands on activity Install and run Tor
Run Wireshark while connecting through Tor Explore tor metrics data
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.