Upcoming SlideShare
Loading in...5




Presentation given in 2010 about Tor, attack vectors, and advanced usage.

Presentation given in 2010 about Tor, attack vectors, and advanced usage.



Total Views
Views on SlideShare
Embed Views



1 Embed 187 187



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Tor Tor Presentation Transcript

  • Overview Anonymity systems Review of how Tor works Tor Project Inc. Helper tools and accessories Advanced Tor control Attack Vectors
  • Anonymity Systems JAP I2P Freenet Xerobank Botnets
  • Freenet Storage network p2p based Shares files on your system to other nodes Plausabile Deniability
  • I2P Opposing design of Tor UDP based Darknet design Java, Python, and C API’s Mixed routing based on packets Splits tunneling between upstream and downstream “Garlic Routing” – mix streams together to prevent traffic analysis Variable latency design
  • Tor Tor(not TOR) – previously stood for The Onion Router Provides a method of anonymity by passing data between proxies
  • Tor Network
  • Terminology Cell – your message Circuit – tunnel made up of relays Entry Node: first hop into the Tor network Exit Node: last hop before destination Relay Node: middle hop Bridge Node: nodes not listed in the Tor directory to evade filtering
  • Who’s Using Tor? Whistleblowers  Wikileaks – runs hidden service Militaries  field ops  command and control using hidden services Chinese journalists and dissidents
  • Tor Project 501(c)(3) NFP Freely available Full spec and full documentation
  • Project Finances
  • Current Project Sponsors Federal Grant:  International Program to Support Democracy Human Rights and Labor  $632,189 International Broadcasting Bureau  Voice of America, Radio Free Europe/Radio Liberty, Radio and TV Martí, Radio Free Asia, Radio Sawa/Alhurra TV  $270,000 Stichting.Net  Association of NFP’s in the Netherlands  $38,279 Google: $29,083 ITT: $27,000 Other: $9,997
  • Past Funders DARPA and Naval Research Labratory 2001-2006 EFF – 2004-2005
  • Tor Performance
  • Number of Relays
  • Number of Users
  • Tor Tools Torbutton Tor Browser Bundle Vidalia TorCheck Arm Tor-ramdisk  Anthony G. Basile from Buffalo
  • Tor Control Port Telnet to the control port authenticate "“ Create custom circuits (long or short) extendcircuit 0 a,b,c,… extendcircuit 0 a,b Show live circuit information setevents circ Change configuration on the fly setconf confitem Map a site to an exit node Mapaddress Reload a configuration Getconf confitem
  • Attacks
  • Tor Passive Attack Vectors Traffic profiling – entry and exit analysis Cleartext exit node transmission Fingerprinting - OS, browser, configuration, activity Timing correlation Network partitioning End to end Size correlation
  • Tor Active Attack Vectors Compromised keys Malicious web servers Malicious Exit/Relay nodes DoS non-controlled nodes Timestamping and tagging Injecting or replacing unencrypted info Malicious Tor client
  • Tor Client Side Attacks DNS rebinding Disbanding attack – javascript, java, flash History disclosure Timezone information (partitioning)
  • Social Engineering Attacks Getting more traffic  “Use my relay. I have huge tubes!”  “Nick’s relay sucks”  “I’ve added a feature to my node.” Replacement  687474703a2f2f7777772e726f63686573746572323 630302e636f6d2f6861782f Partitioning  “Don’t use servers from this country”  “These servers are amazing!”
  • More Info @torproject