23
UK TOP SECRET STRAP1 COMINT A potential technique to deanonymise users of the TOR network OPC-MCR, GCHQ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on © Crown Copyright. All rights reserved.

A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

  • Upload
    vocong

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

A potential technique to deanonymise users of the TOR network

OPC-MCR, GCHQ

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on

© Crown Copyright. All rights reserved.

Page 2: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Outline • TOR and the need for deanonymisation • Data transformation • Scoring • Results • Current status • Software

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 3: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

What is TOR? • "The Onion Router" • Hides source of traffic by passing encrypted

versions of your internet traffic between multiple TOR routers

• Notation: - "Client" - the initiator of communication - "Guard node" - the TOR router the client contacts - "Exit node" - the TOR router that relays your traffic to

the final destination (with no extra encryption so this link can be exploited by SIGINT system)

G C H Q^^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ

© Crown Copyright. All rights reserved.

Page 4: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

Onion Router

Onion Router

Onion Router

Onion Router

Client

Server

UK TOP SECRET STRAP1 COMINT

What is TOR? Guard Node

/ Onion \ T Router /

Exit Node

G C H Q^^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ or|

© Crown Copyright. All rights reserved.

Page 5: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Who uses TOR? • TOR was created by the US government and is

now maintained by the Electronic Frontier Foundation (EFF)

• EFF will tell you there are many pseudo-legitimate uses for TOR

• We're interested as bad people use TOR, in particular: - Terrorists - Paedophiles

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ or

© Crown Copyright. All rights reserved.

Page 6: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Aim • Find client IP address associated with TOR

exit node traffic • Attack based on externals - specifically packet

timings - Strong crypt is being used

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 7: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Aim • We'll make our task easier by assuming we own

the exit node being used - Allows us to see all the traffic associated with a TOR

circuit - Demultiplex traffic by (unknown) user

F ^ ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on

I G C H Q ^ © Crown Copyright. All rights reserved.

Page 8: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Side note: Circuit tracing • One suggestion was to track packets through each

hop in the TOR network • We experimented with spotting all links in circuits

created by GCHQ • Visibility was too low to be a sensible approach

- 13 out of 8294 potential inter-TOR-router links were seen

• We will directly correlate: - exit node traffic, and - traffic between client and guard node

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 9: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Own

IGCHQ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 10: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Test data collection • Used the standard "TOR button" web-browser

package to access TOR • Made minor changes to ensure we could collect exit

node traffic 1. "News": Search for news, visit news websites 2. "TOR": Browse the TOR website and then use a privacy

checking website Split into 2a and 2b as TOR changed circuit mid-way through

1. "Download": visit to SlashDot followed by downloading a large PDF file.

2. "Forum": Search on Google followed by browsing a PC technical help forum.

IGCHQ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 11: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Flattening of timing patterns ^ ^ ^ ^ • ( I C T R - N E ) observed that TOR can flatten out timing patterns TOR uses a rate-limiting store-and-forward procedure at each TOR router Graph shows bytes of exit node traffic in green and client traffic in red whilst downloading a 1MB file (figure from

- 5 Q Q 0 0

— 2 5 0 Q Q

T Os

T 5 0 ; 1 0 0 s 1 5 D S 2 0 0 s

F ^ ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under ^ ^ other UK information legislation. Refer disclosure requests to GCHQ on

I G C H Q ^ © Crown Copyright. All rights reserved.

Page 12: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Cumulative packet counts Our new insight is to use cumulative packet counts Hope packets are approximately preserved - Approximate as TOR

repacketises data See strong correlation

Exit Guard

l r

StoC

T 1 1 1 1 1 1 5 : 4 6 1 5 : 4 8 1 5 : 5 0 1 5 : 5 2 1 5 : 5 4 1 5 : 5 6 1 5 : 4 6 1 5 : 4 8 1 5 : 5 0 1 5 : 5 2 1 5 : 5 4 1 5 : 5 6

1 6 : 2 2 1 6 : 2 4 1 6 : 2 6 16:28 15:22

Time (hh:mm) 15:24

1 r 16:26 16:2B

G C H Q^^ o i This information is exempt from disclosure under the Freedom of Inforn other UK information legislation. Refer disclosure requests to GCHQ or

© Crown Copyright. All rights reserved.

Page 13: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Scoring: basic idea An idea of - Bin time into intervals - For each interval get a pair (E,, G,)

• Cumulative exit node packets upto time i • Cumulative guard node packets upto time i

- Measure the correlation between these pairs We use Is time-windows - Easy for the SIGI NT system - Seems to work

G C H Q^^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 14: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Scoring: refinements • We also expect counts to be similar

- Fit a linear model . Gi = a+pE i

- Only accept sessions where V 2 < ¡ 5 < 2

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 15: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Scoring: refinements • There may be an unknown time-offset

- Traffic takes time to relay through the TOR network - SIGINT clocks may not be synchronised - We slide the traces against each other and find the best

match - Truncate to exit node trace (we know that it is a

complete TOR circuit)

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on

G C H Q ^ ^ © Crown Copyright. All rights reserved.

Page 16: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Self-comparison beta

We show how the score behaviour as a function of time slide See high correlation (pink) at small time offset Also generally see (3 (blue) in a sensible range

2.0

1.5

1.0

0 ,5

2 .0

1.5

1.0 -

0.5

0.0

2.0 -

1.5

1.0

0 .5 H

0.0

r~2

-500 500

CtoS 1 StoC 1

CtoS 2a StoC 2a

1 \ il 1 1 ft CtoS 2 b StoC 2b

\ \ CtoS 3 StoC 3

\

CtoS 4 StoC 4

X \ -500 500

Time offset / s

IGCHQ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under

^ other UK information legislation. Refer disclosure requests to GCHQ on

Crown Copyright. All rights reserved.

Page 17: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

False positives • Want an algorithm with very low false positive rate • Used 2 hours of (timestamp, source IP, destination

IP) tuples captured from 4 10G internet bearers • Filtered to tuples between a guard node and a non-

TOR node • Allow time to arbitrarily slide +/- 2 hours

- In real redeployment one would restrict this slide • Allow us to plot ROC curves for the technique

I G C H Q ^

This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 18: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAF

False positives Linear - log ROC curve plot Server-to-client good - We miss the very short "2a"

session with no false-positives - Threshold r2=0.998

• High as comparing increasing functions

Client-to-server direction -many false positives - There's less structure in data as

less data flows in this direction when web-browsing

Server to client

« £

-i—' v> o CL <D

OO Ö

CO o

CN Ö o Ö n

1 e - 0 6

I I 1e-04 1e-02

False positive rate

Client to server

1e+00

jD œ

I ¡7) O CL

où Ó (O ö ö

(M Ö O ö

IGCHQ̂ This information is exempt from disclosure under the Freedom of Infoi other UK information legislation. Refer disclosure requests to GCHQ c

© Crown Copyright. All rights reserved.

1e-06 1e-04 1e-02

False positive rate

1e+00

Page 19: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

A larger experiment • We want to find some false hits to understand worst

case accuracy for the server-to-client direction • Let's open the aperture very wide

- 2027 bearer hours of logs with any time slide - Filter to all traffic involving a TOR node

• Not just likely guard-to-client traffic as before

• We find some false hits (540) but rate is assessed to be low enough.

• 92% of false hits are against the big download session which has little structure

IGCHQ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 20: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

The next step • We are collecting the required logs of packet

times with TOR guard nodes in SIGINT • GTE / JTRIG have adapted some TOR exit nodes

we own to collect the required exit node data - We are keen to engage with others with exit nodes too

• Then run the attack - Expect to basically work - Some extra work might be required to only allow

queries on sessions with enough structure • Need the bulk data first to progress this question

This information is exempt from disclosure under the Freedom of lnformatiorW\ç^OO(^JTçhT^^ other UK information legislation. Refer disclosure requests to GCHQ

IGCHQ^ © Crown Copyright. All rights reserved.

Page 21: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

R package An R packaae can be downloaded from

Includes algorithm and the collected web-browsing data Recommend R packages for sharing analytics, can contain: - R / C / Fortran code - Example data - Runnable examples and documentation - Unit tests

G C H Q^^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.

Page 22: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

Conclusion • Have shown a potential externals-based

deanonymisation attack for TOR - Requires SIGINT collection of guard-to-client packet

times - Requires TOR collection from exit nodes we own

• Hope to get this running live at GCHQ soon

• Full paper and software available from

IGCHQ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on |

© Crown Copyright. All rights reserved.

Page 23: A potential technique to deanonymise users of the … potential technique to deanonymise users of the TOR network OPC-MCR, ... TOR uses a rate-limitin store-and-forwarg d

UK TOP SECRET STRAP1 COMINT

IGCHQ^ This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information legislation. Refer disclosure requests to GCHQ on|

© Crown Copyright. All rights reserved.