Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Anonymity Systems: Tor

3,393 views

Published on

Presentation at Rochester 2600 group about the Tor Project.

Published in: Technology
  • Be the first to comment

Anonymity Systems: Tor

  1. 1.
  2. 2. Overview<br />Anonymity systems<br />Review of how Tor works<br />Tor Project Inc.<br />Helper tools and accessories<br />Advanced Tor control<br />Attack Vectors<br />
  3. 3. Anonymity Systems<br />JAP<br />I2P<br />Freenet<br />Xerobank<br />Botnets<br />
  4. 4. Freenet<br />Storage network p2p based<br />Shares files on your system to other nodes<br />Plausabile Deniability<br />
  5. 5. I2P<br />Opposing design of Tor<br />UDP based<br />Darknet design <br />Java, Python, and C API’s<br />Mixed routing based on packets<br />Splits tunneling between upstream and downstream<br />“Garlic Routing” – mix streams together to prevent traffic analysis<br />Variable latency design<br />
  6. 6. Tor<br />Tor (not TOR) – previously stood for The Onion Router<br />Provides a method of anonymity by passing data between proxies<br />
  7. 7. Tor Network<br />
  8. 8. Terminology<br />Cell – your message<br />Circuit – tunnel made up of relays<br />Entry Node: first hop into the Tor network<br />Exit Node: last hop before destination<br />Relay Node: middle hop<br />Bridge Node: nodes not listed in the Tor directory to evade filtering<br />
  9. 9. Who’s Using Tor?<br />Whistleblowers<br />Wikileaks – runs hidden service<br />Militaries<br />field ops<br />command and control using hidden services<br />Chinese journalists and dissidents<br />
  10. 10. Tor Project<br />501(c)(3) NFP<br />Freely available<br />Full spec and full documentation<br />
  11. 11. Project Finances<br />https://www.torproject.org/about/financials.html<br />
  12. 12. Current Project Sponsors<br />Federal Grant: <br />International Program to Support Democracy Human Rights and Labor<br />$632,189<br />International Broadcasting Bureau<br />Voice of America, Radio Free Europe/Radio Liberty, Radio and TV Martí, Radio Free Asia, Radio Sawa/Alhurra TV<br />$270,000<br />Stichting.Net<br />Association of NFP’s in the Netherlands<br />$38,279<br />Google: $29,083<br />ITT: $27,000<br />Other: $9,997<br />https://www.torproject.org/about/sponsors.html.en<br />
  13. 13. Past Funders<br />DARPA and Naval Research Labratory 2001-2006<br />EFF – 2004-2005<br />
  14. 14. Tor Performance<br />
  15. 15. Number of Relays<br />
  16. 16. Number of Users<br />
  17. 17. Tor Tools<br />Torbutton<br />Tor Browser Bundle<br />Vidalia<br />TorCheck<br />Arm<br />Tor-ramdisk<br />Anthony G. Basile from Buffalo<br />
  18. 18.
  19. 19. Tor Control Port<br />authenticate "“<br />extendcircuit 0 a,b,c,…<br />extendcircuit 0 a,b<br />seteventscirc<br />setconfconfitem<br />Mapaddress google.com=a.b<br />Getconfconfitem<br />Telnet to the control port <br />Create custom circuits (long or short)<br />Show live circuit information<br />Change configuration on the fly<br />Map a site to an exit node<br />Reload a configuration<br />
  20. 20. Attacks<br />
  21. 21. Tor Passive Attack Vectors<br />Traffic profiling – entry and exit analysis<br />Cleartext exit node transmission<br />Fingerprinting - OS, browser, configuration, activity<br />Timing correlation<br />Network partitioning<br />End to end Size correlation<br />
  22. 22. Tor Active Attack Vectors<br />Compromised keys<br />Malicious web servers<br />Malicious Exit/Relay nodes<br />DoS non-controlled nodes<br />Timestamping and tagging<br />Injecting or replacing unencrypted info<br />Malicious Tor client<br />
  23. 23. Tor Client Side Attacks<br />DNS rebinding<br />Disbanding attack – javascript, java, flash<br />History disclosure<br />Timezone information (partitioning)<br />
  24. 24. Social Engineering Attacks<br />Getting more traffic<br />“Use my relay. I have huge tubes!”<br />“Nick’s relay sucks”<br />“I’ve added a feature to my node.”<br />Replacement<br />“Tor rapes babies. Use my software.”<br />Partitioning<br />“Don’t use servers from this country”<br />“These servers are amazing!”<br />
  25. 25. More Info<br />www.torproject.org<br />Metrics.torproject.org<br />Blog.torproject.org<br />Check.torproject.org<br />@torproject<br />

×