andrew lewman [email protected] january 19, 2011 · 2019. 10. 10. · andrew lewman...

55
NCMEC Tor Overview Andrew Lewman [email protected] January 19, 2011 Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 1 / 28

Upload: others

Post on 28-Jan-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

  • NCMEC Tor Overview

    Andrew [email protected]

    January 19, 2011

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 1 / 28

  • What are we talking about?

    Crash course on anonymous communications

    Quick overview of Tor

    Quick overview of Tor Hidden Services

    Future directions

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 2 / 28

  • The Tor Project, Inc.

    501(c)(3) non-profit organization dedicated to the research anddevelopment of technologies for online anonymity and privacy

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 3 / 28

  • What is anonymity?

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 4 / 28

  • Anonymity isn’t cryptography

    Cryptography protects the contents in transit

    You still know who is talking to whom, how often, and how muchdata is sent.

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 5 / 28

  • Anonymity isn’t steganography

    Attacker can tell Alice is talking to someone, how often, and how muchdata is sent.

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 6 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • Anonymity isn’t just wishful thinking...

    ”You can’t prove it was me!”

    ”Promise you won’t look”

    ”Promise you won’t remember”

    ”Promise you won’t tell”

    ”I didn’t write my name on it!”

    ”Isn’t the Internet already anonymous?”

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 7 / 28

  • ..since ”weak” isn’t anonymity.

    ”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

    ”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

    ”I didn’t write my name on it!” Not what we’re talking about.

    ”Isn’t the Internet already anonymous?” Nope!

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 8 / 28

  • ..since ”weak” isn’t anonymity.

    ”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

    ”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

    ”I didn’t write my name on it!” Not what we’re talking about.

    ”Isn’t the Internet already anonymous?” Nope!

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 8 / 28

  • ..since ”weak” isn’t anonymity.

    ”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

    ”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

    ”I didn’t write my name on it!” Not what we’re talking about.

    ”Isn’t the Internet already anonymous?” Nope!

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 8 / 28

  • ..since ”weak” isn’t anonymity.

    ”You can’t prove it was me!” Proof is a very strong word. Statisticalanalysis allows suspicion to become certainty.

    ”Promise you won’t look/remember/tell” Will other parties have theabilities and incentives to keep these promises?

    ”I didn’t write my name on it!” Not what we’re talking about.

    ”Isn’t the Internet already anonymous?” Nope!

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 8 / 28

  • Anonymous communication

    People have to hide in a crowd of other people (”anonymity lovescompany”)

    The goal of the system is to make all users look as similar as possible,to give a bigger crowd

    Hide who is communicating with whom

    Layered encryption and random delays hide correlation between inputtraffic and output traffic

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 9 / 28

  • Low versus High-latency anonymous communicationsystems

    Tor is not the first system; ZKS, mixmaster, single-hop proxies,Crowds, Java Anon Proxy.

    Low-latency systems are vulnerable to end-to-end correlation attacks.

    High-latency systems are more resistant to end-to-end correlationattacks, but by definition, less interactive.

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 10 / 28

  • Low-latency systems are generally more attractive totoday’s user

    Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs,video streaming (millions of users)

    Multi-hour delays: email, nntp, blog posting? (tens of thousands ofusers?)

    And if anonymity loves company...

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 11 / 28

  • Low-latency systems are generally more attractive totoday’s user

    Interactive apps: web, instant messaging, VOIP, ssh, X11, cifs/nfs,video streaming (millions of users)

    Multi-hour delays: email, nntp, blog posting? (tens of thousands ofusers?)

    And if anonymity loves company...

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 11 / 28

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TA(I)LS LiveCD, Tor Weather,Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 12 / 28

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TA(I)LS LiveCD, Tor Weather,Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 12 / 28

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TA(I)LS LiveCD, Tor Weather,Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 12 / 28

  • What is Tor?

    online anonymity software and network

    open source, freely available (3-clause BSD license)

    active research environment:Rice, UMN, NSF, NRL, Drexel, Waterloo, Cambridge UK, BambergGermany, Boston Univ, Harvard, MIT, RPI, Georgia Tech

    increasingly diverse toolset:Tor, Torbutton, Tor Browser Bundle, TA(I)LS LiveCD, Tor Weather,Tor auto-responder, Secure Updater, Orbot, Torora, Tor Check, Arm,Nymble, Tor Control, Tor Wall, TorVM

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 12 / 28

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 13 / 28

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 13 / 28

  • How is Tor different from other systems?

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 13 / 28

  • Twitter in Iran: Good.

    From http://www.time.com/time/world/article/0,8599,1905125,00.html

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 14 / 28

  • Twitter in USA: Bad.

    from http://gothamist.com/2009/10/05/fbi raids queens home in g20 protes.php

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 15 / 28

  • Who uses Tor?

    Normal people

    LawEnforcement

    Human RightsActivists

    Business Execs

    Militaries

    Abuse Victims

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 16 / 28

  • estimated 300k to 800k daily users

    ]

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 17 / 28

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor user

    Diagram: Robert Watson

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 18 / 28

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor userTor Node

    Tor Node

    Tor Node

    Exit node

    Entry nodeMiddle node

    Diagram: Robert Watson

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 18 / 28

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Tor Node

    Tor Node

    Tor Node

    Tor Node

    Tor NodeTor Node

    Tor Node

    Tor Node

    Tor Network

    Web server

    Tor user

    Encrypted tunnel

    Unencrypted TCP

    Tor Node

    Tor Node

    Tor Node

    Exit node

    Entry nodeMiddle node

    Diagram: Robert Watson

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 18 / 28

  • Tor hides communication patterns by relaying data throughvolunteer servers

    Diagram: Robert Watson

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 18 / 28

  • Vidalia Network Map

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 19 / 28

  • Metrics

    Measuring metrics anonymously

    NSF grant to find out

    Archive of hourly consensus, ExoneraTor, VisiTor

    Metrics portal:https://metrics.torproject.org/

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 20 / 28

    https://metrics.torproject.org/

  • Tor hidden services allow privacy enhanced hosting ofservices

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 21 / 28

  • dot onion you say?

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 22 / 28

  • Hidden services, in text

    Distributed Hash Table (DHT) Directory

    Rendezvous points

    Anonymity for both the server and client

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 23 / 28

  • Hidden services, in text

    Distributed Hash Table (DHT) Directory

    Rendezvous points

    Anonymity for both the server and client

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 23 / 28

  • Hidden services, in text

    Distributed Hash Table (DHT) Directory

    Rendezvous points

    Anonymity for both the server and client

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 23 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Hidden Services, in graphics

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 24 / 28

  • Operating Systems leak info like a sieve

    Applications, networkstacks, plugins, oh my....

    some call this ”sharing”

    Did you know MicrosoftWord and OpenOfficeWriter are browsers?

    www.decloak.net is afine test

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 25 / 28

    www.decloak.net

  • Operating Systems leak info like a sieve

    Applications, networkstacks, plugins, oh my....some call this ”sharing”

    Did you know MicrosoftWord and OpenOfficeWriter are browsers?

    www.decloak.net is afine test

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 25 / 28

    www.decloak.net

  • Operating Systems leak info like a sieve

    Applications, networkstacks, plugins, oh my....some call this ”sharing”

    Did you know MicrosoftWord and OpenOfficeWriter are browsers?

    www.decloak.net is afine test

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 25 / 28

    www.decloak.net

  • Operating Systems leak info like a sieve

    Applications, networkstacks, plugins, oh my....some call this ”sharing”

    Did you know MicrosoftWord and OpenOfficeWriter are browsers?

    www.decloak.net is afine test

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 25 / 28

    www.decloak.net

  • Mobile Operating Systems

    Entirely new set of challenges for something designed to know whereyou are at all times.

    Orbot: Tor on Android. https://guardianproject.info/apps/

    Tor on iphone, maemo/meego, symbian, etc

    Tor on Windows CE, http://www.gsmk.de as an example.

    Guardian Project, https://guardianproject.info/

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 26 / 28

    https://guardianproject.info/apps/http://www.gsmk.dehttps://guardianproject.info/

  • Next steps

    Visit https://www.torproject.org/ for more information, links, andideas.

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 27 / 28

    https://www.torproject.org/

  • Credits & Thanks

    who uses tor?http://www.flickr.com/photos/mattw/2336507468/siz, MattWestervelt, CC-BY-SA.

    danger!, http://flickr.com/photos/hmvh/58185411/sizes/o/,hmvh, CC-BY-SA.

    500k, http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/,Luka Skracic, used with permission.

    Andrew Lewman [email protected] () NCMEC Tor Overview January 19, 2011 28 / 28

    http://www.flickr.com/photos/mattw/2336507468/sizhttp://flickr.com/photos/hmvh/58185411/sizes/o/http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/http://www.flickr.com/photos/lukaskracic/334850378/sizes/l/