Download presentation
Presentation is loading. Please wait.
1
Bruce Maggs relying on materials from http://www.torproject.org
Tor Bruce Maggs relying on materials from
3
How Tor Works (directory server)
4
How Tor Works
6
Encryption Keys in TOR Each relay has a long-term ``identity’’ public/private key pair used to sign TLS certificates (public keys signed by directory) Medium-term (one week) public/private ``onion’’ keys are used to decrypt requests to extend circuits – so first node can’t spoof the whole path. These keys are deleted so that if relay is compromised, old traffic can’t be decrypted. Short-term “connection” or “ephemeral” shared private keys are used to encrypt connections.
7
How Tor Works
8
Bridge Relays (a.k.a. Bridges)
Some ISPs/governments block all traffic to relays that appear in the Tor directory. Bridges are relays that don’t appear in the directory. User has to solve the problem of finding a bridge.
9
Solve a Captcha to get Bridge Address
11
Growth of Tor Network
12
Growth of Tor Network
13
Spike in Number of Users
14
Possible Explanation for Spike
Botnet “Mevade.A” a.k.a. “Sefnit” a.k.a. “SBC” is using Tor for connectivity
16
Tor Exit Nodes See Plaintext!
17
Tor Browser
18
Tor Browser
20
Tor-Aware Web Servers Connect directly to Tor, do not advertise their network addresses.
21
Establishing a Hidden Service
22
Establishing a Hidden Service
23
Finding a Hidden Service
24
Contacting a Hidden Service
25
Contacting a Hidden Service
26
Communicating with a Hidden Service
27
Using Tor as a SOCKS5 Proxy
Can tunnel any TCP connection through Tor (and DNS requests) First run the Tor browser, it will also act as a SOCKS5 proxy and accept connections Configure your application, e.g., chat, to use as SOCKS5 proxy
28
Configure HexChat to use Proxy
29
Now Chatting through Tor
30
4
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.