Overview<br />Anonymity systems<br />Review of how Tor works<br />Tor Project Inc.<br />Helper tools and accessories<br />...
Anonymity Systems<br />JAP<br />I2P<br />Freenet<br />Xerobank<br />Botnets<br />
Freenet<br />Storage network p2p based<br />Shares files on your system to other nodes<br />Plausabile Deniability<br />
I2P<br />Opposing design of Tor<br />UDP based<br />Darknet design <br />Java, Python, and C API’s<br />Mixed routing base...
Tor<br />Tor (not TOR) – previously stood for The Onion Router<br />Provides a method of anonymity by passing data between...
Tor Network<br />
Terminology<br />Cell – your message<br />Circuit – tunnel made up of relays<br />Entry Node: first hop into the Tor netwo...
Who’s Using Tor?<br />Whistleblowers<br />Wikileaks – runs hidden service<br />Militaries<br />field ops<br />command and ...
Tor Project<br />501(c)(3) NFP<br />Freely available<br />Full spec and full documentation<br />
Project Finances<br />https://www.torproject.org/about/financials.html<br />
Current Project Sponsors<br />Federal Grant: <br />International Program to Support Democracy Human Rights and Labor<br />...
Past Funders<br />DARPA and Naval Research Labratory 2001-2006<br />EFF – 2004-2005<br />
Tor Performance<br />
Number of Relays<br />
Number of Users<br />
Tor Tools<br />Torbutton<br />Tor Browser Bundle<br />Vidalia<br />TorCheck<br />Arm<br />Tor-ramdisk<br />Anthony G. Basi...
Tor Control Port<br />authenticate "“<br />extendcircuit 0 a,b,c,…<br />extendcircuit 0 a,b<br />seteventscirc<br />setcon...
Attacks<br />
Tor Passive Attack Vectors<br />Traffic profiling – entry and exit analysis<br />Cleartext exit node transmission<br />Fin...
Tor Active Attack Vectors<br />Compromised keys<br />Malicious web servers<br />Malicious Exit/Relay nodes<br />DoS non-co...
Tor Client Side Attacks<br />DNS rebinding<br />Disbanding attack – javascript, java, flash<br />History disclosure<br />T...
Social Engineering Attacks<br />Getting more traffic<br />“Use my relay. I have huge tubes!”<br />“Nick’s relay sucks”<br ...
More Info<br />www.torproject.org<br />Metrics.torproject.org<br />Blog.torproject.org<br />Check.torproject.org<br />@tor...
Upcoming SlideShare
Loading in …5
×

Anonymity Systems: Tor

2,889
-1

Published on

Presentation at Rochester 2600 group about the Tor Project.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,889
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
137
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Anonymity Systems: Tor

  1. 1.
  2. 2. Overview<br />Anonymity systems<br />Review of how Tor works<br />Tor Project Inc.<br />Helper tools and accessories<br />Advanced Tor control<br />Attack Vectors<br />
  3. 3. Anonymity Systems<br />JAP<br />I2P<br />Freenet<br />Xerobank<br />Botnets<br />
  4. 4. Freenet<br />Storage network p2p based<br />Shares files on your system to other nodes<br />Plausabile Deniability<br />
  5. 5. I2P<br />Opposing design of Tor<br />UDP based<br />Darknet design <br />Java, Python, and C API’s<br />Mixed routing based on packets<br />Splits tunneling between upstream and downstream<br />“Garlic Routing” – mix streams together to prevent traffic analysis<br />Variable latency design<br />
  6. 6. Tor<br />Tor (not TOR) – previously stood for The Onion Router<br />Provides a method of anonymity by passing data between proxies<br />
  7. 7. Tor Network<br />
  8. 8. Terminology<br />Cell – your message<br />Circuit – tunnel made up of relays<br />Entry Node: first hop into the Tor network<br />Exit Node: last hop before destination<br />Relay Node: middle hop<br />Bridge Node: nodes not listed in the Tor directory to evade filtering<br />
  9. 9. Who’s Using Tor?<br />Whistleblowers<br />Wikileaks – runs hidden service<br />Militaries<br />field ops<br />command and control using hidden services<br />Chinese journalists and dissidents<br />
  10. 10. Tor Project<br />501(c)(3) NFP<br />Freely available<br />Full spec and full documentation<br />
  11. 11. Project Finances<br />https://www.torproject.org/about/financials.html<br />
  12. 12. Current Project Sponsors<br />Federal Grant: <br />International Program to Support Democracy Human Rights and Labor<br />$632,189<br />International Broadcasting Bureau<br />Voice of America, Radio Free Europe/Radio Liberty, Radio and TV Martí, Radio Free Asia, Radio Sawa/Alhurra TV<br />$270,000<br />Stichting.Net<br />Association of NFP’s in the Netherlands<br />$38,279<br />Google: $29,083<br />ITT: $27,000<br />Other: $9,997<br />https://www.torproject.org/about/sponsors.html.en<br />
  13. 13. Past Funders<br />DARPA and Naval Research Labratory 2001-2006<br />EFF – 2004-2005<br />
  14. 14. Tor Performance<br />
  15. 15. Number of Relays<br />
  16. 16. Number of Users<br />
  17. 17. Tor Tools<br />Torbutton<br />Tor Browser Bundle<br />Vidalia<br />TorCheck<br />Arm<br />Tor-ramdisk<br />Anthony G. Basile from Buffalo<br />
  18. 18.
  19. 19. Tor Control Port<br />authenticate "“<br />extendcircuit 0 a,b,c,…<br />extendcircuit 0 a,b<br />seteventscirc<br />setconfconfitem<br />Mapaddress google.com=a.b<br />Getconfconfitem<br />Telnet to the control port <br />Create custom circuits (long or short)<br />Show live circuit information<br />Change configuration on the fly<br />Map a site to an exit node<br />Reload a configuration<br />
  20. 20. Attacks<br />
  21. 21. Tor Passive Attack Vectors<br />Traffic profiling – entry and exit analysis<br />Cleartext exit node transmission<br />Fingerprinting - OS, browser, configuration, activity<br />Timing correlation<br />Network partitioning<br />End to end Size correlation<br />
  22. 22. Tor Active Attack Vectors<br />Compromised keys<br />Malicious web servers<br />Malicious Exit/Relay nodes<br />DoS non-controlled nodes<br />Timestamping and tagging<br />Injecting or replacing unencrypted info<br />Malicious Tor client<br />
  23. 23. Tor Client Side Attacks<br />DNS rebinding<br />Disbanding attack – javascript, java, flash<br />History disclosure<br />Timezone information (partitioning)<br />
  24. 24. Social Engineering Attacks<br />Getting more traffic<br />“Use my relay. I have huge tubes!”<br />“Nick’s relay sucks”<br />“I’ve added a feature to my node.”<br />Replacement<br />“Tor rapes babies. Use my software.”<br />Partitioning<br />“Don’t use servers from this country”<br />“These servers are amazing!”<br />
  25. 25. More Info<br />www.torproject.org<br />Metrics.torproject.org<br />Blog.torproject.org<br />Check.torproject.org<br />@torproject<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×