12th CENTRAL & EASTERN EUROPEAN
SOFTWARE ENGINEERING CONFERENCE IN RUSSIA
October 28 - 29, Moscow
Aleksandr Lazarenko
Anonymity of Tor: myth and reality
NRU HSE
2
What
is
Tor?
The Onion Router
Anonymous network
Volunteer servers
Free software
Browser
&
Messenger
3
4
5
Tor is
distributed
6
Every server is VOLUNTEER
7
So what
8
The larger the
network
9
The greater
the anonymity
10
11
1998
The Onion Routing
DARPA*
Free Haven Project
MIT
* Defense Advanced Research Projects Agency
12
2002
DECLASSIFIED
Launched
Open-source
13
2009
Mozilla Firefox
Out-of-the box
Browser
Tor inside
14
Tor
Messenger
2015
Private chats
Anonymity
Messenger
Tor inside
15
16
2 000 000
Users per day
17
0 50000 100000 150000 200000 250000 300000 350000 400000 450000
Netherlands
Japan
Brazil
Italy
Spain
UK
Russia
France
Germany
USA
Number of users per day
18
Unique
Hidden
Services
19
Tor
Relays
Who are users?
20
Just
people
21
Journalists
&
Bloggers
22
Police
&
friends
23
Business
24
Military
25
IT
pros
26
Crime
27
WHY
DEEP WEB?
28
Because
HIDDEN Services!
29
30
Anonymous
server
2004
Only for Tor
.onion
Anonymity for Servers
31
Inaccessible
On the
Internet
WikiLeaks:
32
http://suw74isz7wqzpmgu.onion
33
How
does it
work?
34
Tor Client
User
Connects with Tor
Has installed soft
Any PC
35
Entry guard
Relay
Speaks with Client
Encrypts data
Retranslates data
Entry
36
Middle
Relay
Speaks with Entry
Encrypts data
Speaks with Exit
Entry
Middle
Exit
37
Exit
Relay
Speaks with Middle
Encrypts data
Speaks with Endpoint
Exit
Middle
Endpoint
Default circuit
middle
exit
Endpoint
entry
Encrypted connection
Just connection
38
Tor Client
Client
receives the
list of all Tor
nodes from
directory
server
Tor Client
Directory server
Endpoint #1
Endpoint #2
Encrypted connection
Just connection
39
Step #1
Client
initializes the
random path
through the
network
Endpoint 1
Endpoint 2
entry
middle
exit
40ы
Encrypted connection
Just connection
Step #2
Tor Client
Directory server
Client
initializes
another
random path
Endpoint 1
Endpoint 2
entry
middle
exit
41
Tor Client
Directory server
Encrypted connection
Just connection
Step #3
42
43
ONLY
CRIMINALS
USE
TOR
0
2
4
6
8
10
12
14
16
18
Porn Drugs Politics Forgery Anonymity
44
The most popular content
45
46
TOR IS
ANONYMOUS
COMPLETELY
Gov.
VS
Tor 47
48
Silk Road
Used to be the biggest Drug Store
Revenue:
9.5 mln BTC
Closed by FBI
Founder is
life sentenced
49
Attacker only observes
traffic, without
modifying it
Attacks
Attacker observes and
modifies traffic
Passive Active
50
51
Classification
# Resources Attacks
1 Corrupted entry guard  Website fingerprinting attack
2 Corrupted entry and exit nodes  Traffic analysis
 Timing attack
 Circuit fingerprinting attack
 Tagging attack
3 Corrupted exit node  Sniffing of intercepted traffic
4 Corrupted entry and exit nodes,
external server
 Browser based timing attack with
JavaScript injection
 Browser based traffic analysis attack
with JavaScript injection
5 Autonomous system  BGP hijacking
 BGP interception
 RAPTOR attack
6 Big number of various
corrupted nodes
 Packet spinning attack
 CellFlood DoS attack
 Other DoS and DDoS attacks
Website
fingerprinting
attack
52
The Idea:
Data mining Machine learning
53
Attackers strategy
Tor Client
Entry
Exit
DB
website
Data mining
Classifier
training
Website
recognition
54
Feature extraction levels
55
Cell 1 Cell 2 Cell 3 Cell 4 Cell 5
Record 1 Record 2
Packet 1 Packet 2 Packet 3
Cells
TLS
TCP
Attack as a classification problem
Classes
Tracked
websites
Other
56
57
The Oracle problem!
Problem?
58
59
7
Websites
5
Men
1
Relay
80Traffic
Instances
5Uploads
per website
0.71
Accuracy
5Seconds
split
Aleksandr Lazarenko
avlazarenko@edu.hse.ru
60

Анонимность Tor: миф и реальность

Editor's Notes

  • #4 Сеть из волонтерских серверов Самая большая развернутая анонимная сеть в мире The Onion Router
  • #9 Полная децентрализованность Оверлейность Сервера – волонтеры Прячет пользователей друг между другом -> чем > пользователей, тем > анонимность
  • #39 Рассказать здесь про entry, exit, middle. Рассказать здесь про то, что каждый из них знает Рассказать про дополнительные уровни шифровки
  • #54 Данная атака позволяет скомпрометировать портал, помещенный пользователем в сети, при просматривании зашифрованного траффика какой-то части сети.
  • #55 пакетов, их размер и временные интервалы между ними). Используя построенную модель, атакующий классифицирует траффик пользователей в сети. Атака начинается со сбора данных.
  • #57 WF атака может быть представлена в виде задачи классификации Каждый класс может быть группой сайтов, например “Специфический сайт”, “Остальные сайты”. Таким образом, после сбора данных нужно обучить классификатор. После тренировки на полученных образцах, классификатор сможет идентифицировать неизвестные образцы.