the onion router as a social tool

13
TOR: HUMAN FACTORS AND POLICY CONSIDERATIONS Steven I. Davis University of Maryland, University College CSEC 620, E181

Upload: umgc

Post on 27-Nov-2023

0 views

Category:

Documents


0 download

TRANSCRIPT

TOR: HUMAN FACTORS AND POLICY

CONSIDERATIONSSteven I. Davis

University of Maryland, University College

CSEC 620, E181

OVERVIEW

• The Onion Router (TOR): open source software to enable secret

communications

• Estimated 2 million users

• Information travels through distributed Internet Exchange Points (IXP)

and Anonymous Systems (AS)

• Public key encryption used to exchange symmetric keys with multiple nodes

• Each node-key pair in the path of a packet is another “layer in the onion”

• Removes identity-IP link increasing difficulty of “hot spot” law enforcement

• Geographic distribution of IP addresses complicates extradition

• Deep Web vs Dark Web

• See also I2P and Freenet

2

HISTORY

• 20 SEP 2002 – Early version of TOR released by Naval Research Laboratory to protect overseas

operatives and dissidents

• 29 JUN 2009 - Assistance during disputed Iranian elections

• 1 JUN 2011 – Gawker publishes expose on Silk Road, accessible via TOR with Bitcoin (BTC)

payments the norm

• 1 AUG 2013 – Arrest of Irish child pornography facilitator coincides with shutdown of large parts of

darknet, possibly part of FBI sting using Firefox vulnerability

• 4 AUG 2013 – Institute for National Security Studies in Israel reports high-level al-Qaeda leaders

use”deepnet, blacknet, or darknet” to communicate. 21 U.S. embassies closed.

• 1 OCT 2013 – FBI shuts down Silk Road and arrests Dread Pirate Roberts (Ross William Ulbricht).

$1.2 billion sales 2011-2013

• 4 OCT 2014 – Guardian reports NSA able to exploit TOR using side channel attacks3

LEGAL AND LIABILITY

• Facilitates human trafficking, assassinations, drugs, weapons

• Use of Bitcoin (BTC) to anonymize financial transactions

• No guarantee of promised goods due to anonymity

• Hop point functionality used to obtain sensitive data passed to wikileaks

• Loss of proprietary information in corporate environments

• Disclosure of military and national intelligence

4

VULNERABILITIES

• Fact that person using TOR not hidden, only

• Side channel attacks

• Plugins (JavaScript, Java, ActiveX) weaken user

protection

• Limited number of onion routers (~3,000)

• Passive surveillance timing (requires global

reach)

• Active watermarking and delay insertion

(requires malicious nodes)

• Cookies may persist on system after TOR

session ends

5

ANONYMITY

• Access to restricted news

• Open discussion of politics free of reprisal

• Protect journalists and sources

• Support groups (addictions, abuse survivors)

• Evade cyberstalkers

• Transaction Remote Release (TRR) methods can

be applied to Bitcoin transactions to harden

against attacks

• Transmission of validated e-ballots

6

POLICY CONTROL –NODE CONSORTIUM

• Governments, organizations, and individuals contribute to an independent fund to

finance onion router nodes

• Participating node operators are paid on regular basis (daily, monthly, yearly) based

on amount of exit traffic

• Anonymous cryptocurrency used

• Terms of service explicitly forbid examining exit traffic for content

• Increased number of nodes decreases effectiveness of surveillance techniques

7

POLICY CONTROL – PROPRIETARY INFORMATION

• Protect research and development from competitors

• Traffic analysis from corporate IP addresses

• Outwit tailored search results

• See what your customers are seeing

• Conduct research on competitors surreptitiously

8

POLICY CONTROL – DATA CLASSIFICATION

• Security needed in corporate, government, and academic settings

• Protects against over exposure and document exfiltration by malicious insiders

• Low security environment – application blacklisting

• Complicated by raw executable, no installation needed

• Medium security – application whitelisting

• High security – virtualized environment with protected execution stack

• All on site generated documents contain unique user signature

9

POLICY CONTROL - CRYPTOCURRENCY

• Regulate and track moneychangers as traditional currency exchange

• Apply accounting laws to all businesses grossing over $10,000 or equivalent

• May lose effectiveness as market grows to encompass more goods

10

HUMAN FACTORS

• Unconditional anonymity stimulates abusive behavior

• Endowment effect

• Information obtained secretly is worth more

• Illusion of control

• Communications intercepted by other means

• All the information we need can be gotten through TOR

11

REFERENCES

Abbott, R. (2010). AN ONION A DAY KEEPS THE NSA AWAY. Journal Of Internet Law, 13(11), 22-28.

Aguilera, L. (2011). An implementation of accountable anonymity (Master’s thesis). Iowa State University, Ames, IA.

Basarici, S., Rana, A., & Zincir, I. (2015). The Security and the Credibility Challenges in e-Voting Systems. Proceedings Of The

European Conference On E-Learning, 229-232.

Castillo-Pérez, S., & Garcia-Alfaro, J. (2013). Onion routing circuit construction via latency graphs. Computers &

Security, 37197-214. doi:10.1016/j.cose.2013.03.003

Eissa, T., & Gihwan, C. (2015). Lightweight Anti-Censorship Online Network for Anonymity and Privacy in Middle Eastern

Countries. International Arab Journal Of Information Technology (IAJIT),12(6A), 650-657.

Esguerra, R. (2009, June 29). Help Protestors in Iran: Run a Tor Bridge or a Tor Relay [Web log post]. Electronic Frontier

Foundation. Retrieved from https://www.eff.org/deeplinks

Fu, X., Jia, W., Ling, Z., Luo, J., Yu, W., & Zhao, W. (2013). Protocol-level attacks against Tor. Computer Networks, 57869-886.

doi:10.1016/j.comnet.2012.11.005

Fu, X., Jia, W., Ling, Z., Luo, J., Xuan, D., & Yu, W. (2012). A New Cell-Counting-Based Attack Against Tor. IEEE/ACM Transactions

On Networking, 20(4), 1245-1261. doi:10.1109/TNET.2011.217803612

REFERENCES (CONT.)

Kerner, S. M. (2013). Snowden Leaks Show NSA Targets Tor. Eweek, 8.

Kerner, S. M. (2014). Kickstarter Suspends Anonabox Security Appliance Project. Eweek, 2.

Kerner, S. M. (2014). Linux Lands on NSA Watch List. Eweek, 6.

Lawrence, D. (2014). Spy Vs. Spy. (cover story). Bloomberg Businessweek, (4364), 42-47.

McCormick, T. THE DARKNET. Foreign Policy, (203), 22-23.

Mehlman-Orozco, K. (2015). TOR AND THE BITCOIN. Diplomatic Courier, 9(2), 78-81.

Phelps, A., & Watt, A. (2014). I shop online - Recreationally! Internet anonymity and Silk Road enabling drug use in

Australia. Digital Investigation, 11(4), 261-272. doi:10.1016/j.diin.2014.08.001

ShenTu, Q., & Yu, J. (2015). Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin. ATR Defense

Science & Technology., Shenzhen University, Shenzhen, China.

Watson, K. D. (2012). THE TOR NETWORK: A GLOBAL INQUIRY INTO THE LEGAL STATUS OF ANONYMITY

NETWORKS. Washington University Global Studies Law Review, 11(3), 715.13