Tor Users Routed Slides

Embed Size (px)

Citation preview

  • 7/30/2019 Tor Users Routed Slides

    1/75

    Users Get Routed: Traffic Correlationon Tor by Realistic Adversaries

    Aaron Johnson1 Chris Wacek2 Rob J ansen1

    Micah Sherr2 Paul Syverson1

    1U.S. Naval Research Laboratory, Washington, DC2 Georgetown University, Washington, DC

    MPI-SWSJuly 29, 2013

    1

  • 7/30/2019 Tor Users Routed Slides

    2/75

    2

    Summary: What is Tor?

  • 7/30/2019 Tor Users Routed Slides

    3/75

    3

    Tor is a system for anonymous communication.

    Summary: What is Tor?

  • 7/30/2019 Tor Users Routed Slides

    4/75

    4

    Summary: What is Tor?

    Tor is a system for anonymous communication.popular

    ^

    Over 500000 daily users and 2.4GiB/s aggregate

  • 7/30/2019 Tor Users Routed Slides

    5/75

    5

    Summary: Who uses Tor?

  • 7/30/2019 Tor Users Routed Slides

    6/75

    6

    Summary: Who uses Tor?

    Individualsavoidingcensorship

    Individuals

    avoidingsurveillance

    J ournalistsprotectingthemselves orsources

    Law enforcementduringinvestigations

    Intelligence

    analysts forgathering data

  • 7/30/2019 Tor Users Routed Slides

    7/75

    7

    Summary: Tors Big Problem

  • 7/30/2019 Tor Users Routed Slides

    8/75

    8

    Summary: Tors Big Problem

  • 7/30/2019 Tor Users Routed Slides

    9/75

    9

    Summary: Tors Big Problem

  • 7/30/2019 Tor Users Routed Slides

    10/75

    10

    Summary: Tors Big Problem

  • 7/30/2019 Tor Users Routed Slides

    11/75

  • 7/30/2019 Tor Users Routed Slides

    12/75

    12

    Summary: Tors Big Problem

    Traffic Correlation Attack Congestion attacks Throughput attacks Latency leaks

    Website fingerprinting Application-layer leaks Denial-of-Service attacks

  • 7/30/2019 Tor Users Routed Slides

    13/75

    13

    Summary: Our Contributions

  • 7/30/2019 Tor Users Routed Slides

    14/75

    14

    Summary: Our Contributions

    1. Empirical analysis of traffic correlationthreat

    2. Develop adversary framework andsecurity metrics

    3. Develop analysis methodology and tools

  • 7/30/2019 Tor Users Routed Slides

    15/75

    Overview Summary

    Tor Background Tor Security Analysis

    oAdversary Framework

    oSecurity Metrics

    o Evaluation Methodology

    oNode Adversary Analysiso Link Adversary Analysis

    Future Work15

  • 7/30/2019 Tor Users Routed Slides

    16/75

    Overview Summary

    Tor Background Tor Security Analysis

    oAdversary Framework

    oSecurity Metrics

    o Evaluation Methodology

    oNode Adversary Analysiso Link Adversary Analysis

    Future Work16

  • 7/30/2019 Tor Users Routed Slides

    17/75

  • 7/30/2019 Tor Users Routed Slides

    18/75

  • 7/30/2019 Tor Users Routed Slides

    19/75

    Users DestinationsOnion Routers

    19

    Background: Onion Routing

  • 7/30/2019 Tor Users Routed Slides

    20/75

    Users DestinationsOnion Routers

    20

    Background: Onion Routing

  • 7/30/2019 Tor Users Routed Slides

    21/75

    Users DestinationsOnion Routers

    21

    Background: Onion Routing

  • 7/30/2019 Tor Users Routed Slides

    22/75

    22

    Background: Using Circuits

  • 7/30/2019 Tor Users Routed Slides

    23/75

    23

    Background: Using Circuits

    1. Clients begin all circuits with a selected guard.

  • 7/30/2019 Tor Users Routed Slides

    24/75

  • 7/30/2019 Tor Users Routed Slides

    25/75

    25

    Background: Using Circuits

    1. Clients begin all circuits with a selected guard.

    2. Relays define individual exit policies.3. Clients multiplex streams over a circuit.

  • 7/30/2019 Tor Users Routed Slides

    26/75

    26

    Background: Using Circuits

    1. Clients begin all circuits with a selected guard.

    2. Relays define individual exit policies.3. Clients multiplex streams over a circuit.4. New circuits replace existing ones periodically.

  • 7/30/2019 Tor Users Routed Slides

    27/75

    Overview Summary

    Tor Background Tor Security Analysis

    oAdversary Framework

    oSecurity Metrics

    o Evaluation Methodology

    o

    Node Adversary Analysiso Link Adversary Analysis

    Future Work27

  • 7/30/2019 Tor Users Routed Slides

    28/75

    28

    Adversary Framework

  • 7/30/2019 Tor Users Routed Slides

    29/75

    29

    Adversary Framework

  • 7/30/2019 Tor Users Routed Slides

    30/75

    30

    Adversary Framework

  • 7/30/2019 Tor Users Routed Slides

    31/75

  • 7/30/2019 Tor Users Routed Slides

    32/75

    Adversary Framework

    ResourceTypes

    Relays Bandwidth Autonomous

    Systems(ASes)

    Internet

    ExchangePoints (IXPs) Money

    32

  • 7/30/2019 Tor Users Routed Slides

    33/75

  • 7/30/2019 Tor Users Routed Slides

    34/75

    Adversary Framework

    ResourceTypes

    Relays Bandwidth Autonomous

    Systems(ASes)

    Internet

    ExchangePoints (IXPs) Money

    Resource

    Endowment

    Destinationhost

    5% Torbandwidth

    Source AS

    Equinix IXPs

    Goal

    Target a givenuserscommunication

    Compromiseas much trafficas possible

    Learn whouses Tor

    Learn what Toris used for

    34

  • 7/30/2019 Tor Users Routed Slides

    35/75

  • 7/30/2019 Tor Users Routed Slides

    36/75

    Prior metrics

    Security Metrics

  • 7/30/2019 Tor Users Routed Slides

    37/75

  • 7/30/2019 Tor Users Routed Slides

    38/75

    Prior metrics

    1. Probability of choosing bad guard and exita. c2 / n2 : Adversary controls c ofn relays

    b. ge : g guard and e exit BW fractions are bad

    2. Probability some AS/IXP exists on both entryand exit paths (i.e. path independence)

    Security Metrics

  • 7/30/2019 Tor Users Routed Slides

    39/75

    S i M i

  • 7/30/2019 Tor Users Routed Slides

    40/75

    Principles

    1. Probability distribution

    2. Measure on human timescales

    3. Based on adversaries

    40

    Security Metrics

  • 7/30/2019 Tor Users Routed Slides

    41/75

  • 7/30/2019 Tor Users Routed Slides

    42/75

    Overview Background

    Onion Routing Security Analysiso Problem: Traffic correlation

    oAdversary Model

    oSecurity Metrics

    o Evaluation Methodology

    oNode Adversary Analysis

    o Link Adversary Analysis

    Future Work

    42

  • 7/30/2019 Tor Users Routed Slides

    43/75

    TorPS: The Tor Path Simulator

    43

    User Model Client SoftwareModel

    Streams

    Network Model

    Relaystatuses

    StreamCircuitmappings

  • 7/30/2019 Tor Users Routed Slides

    44/75

    TorPS: The Tor Path Simulator

    44

    User Model Client SoftwareModel

    Streams

    Network Model

    Relaystatuses

    StreamCircuitmappings

    T PS U M d l

  • 7/30/2019 Tor Users Routed Slides

    45/75

    TorPS: User Model

    4520-minute traces

    Gmail/GChat

    Gcal/GDocs

    Facebook

    Web search

    IRC

    BitTorrent

  • 7/30/2019 Tor Users Routed Slides

    46/75

    T PS U M d l

  • 7/30/2019 Tor Users Routed Slides

    47/75

    TorPS: User Model

    4720-minute traces

    Gmail/GChat

    Gcal/GDocs

    Facebook

    Web search

    IRC

    BitTorrent

    Typical

    Session schedule

    One session at9:00, 12:00,

    15:00, and 18:00Su-Sa

    Repeated sessions

    8:00-17:00, M-FRepeated sessions0:00-6:00, Sa-Su

    TorPS User Model

  • 7/30/2019 Tor Users Routed Slides

    48/75

    TorPS: User Model

    4820-minute traces

    Gmail/GChat

    Gcal/GDocs

    Facebook

    Web search

    IRC

    BitTorrent

    Typical

    Session schedule

    One session at9:00, 12:00,

    15:00, and 18:00Su-Sa

    Repeated sessions

    8:00-17:00, M-FRepeated sessions0:00-6:00, Sa-Su

    Worst Port

    (6523)Best Port(443)

  • 7/30/2019 Tor Users Routed Slides

    49/75

    Rank Port # Exit BW %Long-Lived

    Application

    1 8300 19.8 Yes iTunes?

    2 6523 20.1 Yes Gobby

    3 26 25.3 No (SMTP+1)

    65312 993 89.8 No IMAP SSL

    65313 80 90.1 No HTTP

    65314 443 93.0 No HTTPS

    49

    TorPS: User Model

    Default-accept ports by exit capacity.

  • 7/30/2019 Tor Users Routed Slides

    50/75

    TorPS: User ModelModel

    Streams/week

    IPs Ports (#s)

    Typical 2632 205 2 (80, 443)

    IRC 135 1 1 (6697)

    BitTorrent 6768 171 118

    WorstPort 2632 205 1 (6523)

    BestPorst 2632 205 1 (443)

    50

    User model stream activity

    TorPS The Tor Path Simulator

  • 7/30/2019 Tor Users Routed Slides

    51/75

    TorPS: The Tor Path Simulator

    51

    User Model Client SoftwareModel

    Streams

    Network Model

    Relaystatuses

    StreamCircuitmappings

  • 7/30/2019 Tor Users Routed Slides

    52/75

    TorPS: The Tor Path Simulator

  • 7/30/2019 Tor Users Routed Slides

    53/75

    TorPS: The Tor Path Simulator

    53

    User Model Client SoftwareModel

    Streams

    Network Model

    Relaystatuses

    StreamCircuitmappings

    TorPS: The Tor Path Simulator

  • 7/30/2019 Tor Users Routed Slides

    54/75

    TorPS: The Tor Path Simulator

    Reimplemented path selection in Python Based on current Tor stable version (0.2.3.25)

    Major path selection features include Bandwidth weighting Exit policies

    Guards and guard rotation Hibernation /16 and family conflicts

    Omits effects of network performance54

    Client Software Model

  • 7/30/2019 Tor Users Routed Slides

    55/75

    Overview Background

    Onion Routing Security Analysiso Problem: Traffic correlation

    oAdversary Model

    oSecurity Metricso Evaluation Methodology

    oNode Adversary Analysis

    o Link Adversary Analysis

    Future Work

    55

  • 7/30/2019 Tor Users Routed Slides

    56/75

    Node Adversary

  • 7/30/2019 Tor Users Routed Slides

    57/75

    Node Adversary

    57

    100 MiB/s total bandwidth

    Probability to compromise at least one stream and rate of compromise, 10/12 3/13.

  • 7/30/2019 Tor Users Routed Slides

    58/75

  • 7/30/2019 Tor Users Routed Slides

    59/75

  • 7/30/2019 Tor Users Routed Slides

    60/75

    Node Adversary Results

  • 7/30/2019 Tor Users Routed Slides

    61/75

    y

    Time to first compromisedexit, 10/12 3/13

    Fraction compromisedexits, 10/12 3/13

    61

    Node Adversary Results

  • 7/30/2019 Tor Users Routed Slides

    62/75

    Time to first compromised circuit, 10/12-3/13

    62

    y

  • 7/30/2019 Tor Users Routed Slides

    63/75

    Overview Background

    Onion Routing Security Analysiso Problem: Traffic correlation

    oAdversary Model

    oSecurity Metricso Evaluation Methodology

    oNode Adversary Analysis

    o Link Adversary Analysis

    Future Work

    63

    Link Adversary

  • 7/30/2019 Tor Users Routed Slides

    64/75

    64

    Link AdversaryAS8

  • 7/30/2019 Tor Users Routed Slides

    65/75

    AS1 AS2 AS3 AS4 AS5

    AS6

    AS8

    AS7

    1. Autonomous Systems (ASes)

    AS6

    65

    Link AdversaryAS8

  • 7/30/2019 Tor Users Routed Slides

    66/75

    1. Autonomous Systems (ASes)

    2. Internet Exchange Points (IXPs)

    AS1 AS2 AS3 AS4 AS5

    AS6

    AS8

    AS7

    AS6

    66

  • 7/30/2019 Tor Users Routed Slides

    67/75

    Link AdversaryAS8

  • 7/30/2019 Tor Users Routed Slides

    68/75

    1. Autonomous Systems (ASes)

    2. Internet Exchange Points (IXPs)

    3. Adversary has fixed location

    AS1 AS2 AS3 AS4 AS5

    AS6

    AS8

    AS7

    AS6

    68

    Link AdversaryAS8

  • 7/30/2019 Tor Users Routed Slides

    69/75

    1. Autonomous Systems (ASes)

    2. Internet Exchange Points (IXPs)

    3. Adversary has fixed location4. Adversary may control multiple entitiesa. Top ASes

    b. IXP organizations

    AS1 AS2 AS3 AS4 AS5

    AS6

    AS8

    AS7

    AS6

    69

  • 7/30/2019 Tor Users Routed Slides

    70/75

  • 7/30/2019 Tor Users Routed Slides

    71/75

  • 7/30/2019 Tor Users Routed Slides

    72/75

  • 7/30/2019 Tor Users Routed Slides

    73/75

  • 7/30/2019 Tor Users Routed Slides

    74/75

  • 7/30/2019 Tor Users Routed Slides

    75/75