Anúncio
Anúncio

Mais conteúdo relacionado

Anúncio
Anúncio

Dark Side of the Net Lecture 4 TOR

  1. MC3003 Dark Side of the Net Lecture 4 The Onion Router (TOR)
  2. Introduction • This week we will look at The Onion Router (TOR) a system that allows for anonymous use of the internet. • TOR allows anonymity on the internet and is used by about 4.5 million people world wide (about .02% of the total users of the internet). • TOR is one of several systems that can be used to achieve anonymity, others include: • I2p – a peer to peer system that has lots of ‘hidden services’ – see later for discussion of this. • Tails – an operating system that can run on a USB stick, Uses TOR but with added security. • TOR is widely used by journalists in countries with heavy censorship, people who wish their communications to remain private and others who may have fear of law enforcement agencies for various reasons. • In this lecture we will look at: • A bit of back ground on TOR • How the internet works and some of its implicit problems – especially the problem of anonymity; • How TOR works; • Some of the applications to which it has been put; • Disadvantages
  3. Anonymity • TOR permits anonymity on the internet. • This is fundamentally making ourselves unidentifiable when we use the internet. • It is about de-linking specific people from actions – trying to ensure that our actions on the internet cannot be traced back to us.
  4. Normal use of the internet • When we use the internet our communications are very ‘open’: • People can see what we are looking at, emails we are sending, the sites we visit and who visited individual sites. • This happens as the internet was designed to be a public network – it did not have security as a core concern in its conception. • How traffic moves around the internet is public information.
  5. Basics of how the internet works… • Information transmitted across the internet is broken down into small ‘packets’ of data. • These are labelled with information on who sent them and their eventual destination. • Every computer connected to the internet has a unique address – the IP (internet protocol) address. • There are two types of address IP v.4 and IP v.6 • IP v. 4 set of 4 3 digit number each between 0-256. EG 123.231.103.003. • IP v.6 8 hexadecimal numbers. EG. 2001:0db8:85a3:0he2:3ts37:8a2e:0370:7334 • When a packet is sent onto the internet ‘routers’ – computers that relay internet traffic - look at the destination and send it on to the next closest router. • The packets may go across a number of different routers before reaching their destination where the receiving computer will reassemble the packets back into the information.
  6. R R R R R R R R R R R R R R
  7. What can Eve do? • If Eve can take control of a node / router on the network she can install bits of software that do things. • Like Packet sniffers – these can look at data that is passed across that computer as it works its way across the network /internet. • From this she can see where the packet has come from, where it is going and its contents. • At the very least she can tell who is looking at what websites, the kind of thing they are doing (are the uploading, down loading files, email, looking at web pages etc). • However if the packets are unencrypted he can read them. • They may contain login information and passwords, confidential information, commercially sensitive information, bank details, credit card numbers etc… • All sorts of juicy data that people do not want known and could be used to build profiles for identity theft and other issues – later lecture on spam ‘spear fishing’.
  8. What else do network analyser apps have on them? • The software also includes a programme called packet sniffer. • Packet sniffers allow network engineers to look at the individual packets that are being sent across a particular node or computer that is on a network. • You need to be on the local network to look at anything. • They will not see all the information being passed around. • But they may see some interesting stuff. • You can only use a packet sniffer on WIFI (so you become part of the network) • Warning: do not use a packet sniffer from a device where you log into the network with an account – it is usually against T&Cs. This is the captured packet. It is in hexadecimal, the translation is to the right.
  9. Why was it designed like this? It’s stupid! • Great if you have nothing to hide… • This approach come from the early days of the internet when those using it were did really have much to hide or want to do so. • They did not care if people saw what they were doing on the internet. • They didn’t see the amount of widespread use that would emerge or the centrality of ICT to our daily lives. • This why cryptography was developed. • It hides the contents of packets of data.
  10. Beyond the ability to ‘listen in’ to unencrypted data… • Your actions on the internet can be tied to your IP address which is your computer. • ISP retain connection records for at least a year. • The police can demand such records. • Investigatory powers bill (passed Nov 2016) requires ISPs to retain detailed records of “account reference, a source [Internet Protocol] and port address, a destination IP and port address and a time/date” for a year. This is accessible without a warrant. • Browsers can also give away valuable information to the websites you view. • The cookies you have on them, HTML 5 and e-tags give away valuable aspects of your identity. • And your computer and network activity may well be held onto for some time by your employer, university etc.
  11. Public key helps… • As we noted previously public key encryption has now done a lot to assist help challenge this and if used correctly emails can now be mostly secret. • Many websites are also a lot more secure. • However even when we do encrypt information - such as when use a secure site (ones with a ) - our identity is revealed. • Even if we do encrypt messages and communications we can still see who is communicating with who without knowing what they actually said.
  12. • From Eve’s point of view knowing that people said something, looked at something, spoke with someone is useful even if we don’t know what. • This is called traffic analysis. • Used in military intelligence and anti-terrorism a lot. • In tracing leaks in government – who communicated with journalists, even though we don’t know what was said, we can find out who said it. • But also in commercial usage and corporate espionage. • If you found out one of your competitors was having lots of discussions with your client you might be concerned (if it was one way from the competitor to the client it would be advertising but if both ways). • What if one of you top staff members was in communication with a competitor? Traffic analysis
  13. So who wants to remain anonymous? • If you live in a society which has censorship rules or you are engaged in activity that the government or powerful organisations object to: • Green activists attacked by corporate and government surveillance; • Civil society and minority activists opposed to civil rights infringements; • Trade unionists opposing blacklisting; • Journalists investigating political corruption. • Such people find being able to communicate covertly very useful. • Also it is useful to: • Law enforcement (they may not want people running dodgy sites to know they are looking at them). • Business people (corporate espionage is very common) - hiring hackers to find out the cost of bids etc. • Abuse victims hiding from abusive partners.
  14. Also whistle blowers like Edward Snowden • Computer scientist who worked for the CIA. • Found out some very bad things governments were doing. • Monitoring all internet traffic coming in and out of the UK; • Installing hidden aps on phones that allow monitoring of the microphone, data and all calls (this is now legal for the security service to do due to the Investigatory Powers Bill (2016)); • Used TOR and other systems to revel the secrets to the Guardian and other newspapers.
  15. So what we need is… • We saw in week 2 how we can encrypt messages. • We now need to make ourselves anonymous. • So Eve cannot see what we are looking at; • So Eve cannot see who is looking at something; • This is where TOR comes in as it offers a way to hide anonymise the information. • It serves as an anonymising bridge between the user and the normal internet. • It is a way in which the user can browse the internet without fear of being identified. • It also has another function (explored in a minute)
  16. TOR a history • Developed in mid 1990s by the US Navy Research Laboratories. • Taken on in 1997 by DARPA. • Released for public use in 2002 and then taken over and developed by Electronic Freedom Foundation, they then handed control to The TOR Project. • Largely funded by the United States Government, Swedish government and private contributors. • However other parts of the US government vigorously oppose TOR seeing it as helping terrorism.
  17. Where it is used…
  18. How TOR works - the TOR network • TOR produce a browser that a user installs on their computer. • TOR uses the same cables and communication pathways as the normal internet. • It is a ‘shadow’ network layered on top of the normal internet. • There is a network of routers across the internet that volunteer their services to TOR. • These routers (currently about 7000 of them) route traffic for TOR and do so using a different from the normal way of passing on internet traffic. • TOR takes the user’s packets and passes them through its network and then feeds them onto the normal internet. • Going through the TOR network removes any means of identification of the user. • (geographical and user data that is included in data transmission without the user’s permission)
  19. Anonymising process • The TOR browser will determine three TOR routers on the network that it will use to convey its message. • Using the public keys of the three chosen TOR routers, the TOR browser wraps packets in 3 layers or skins (hence the name Onion) of encryption. • The normal information is stripped off the packet neither the source nor destination of the packet is available - this is why a normal router cannot deal with TOR data. • The user’s computer running TOR sends out the packet onto the TOR network to the first router it encounters, this is know as the ‘Entry Guard’. • The entry guard knows where the data has come from – but it does not know where the eventual destination. • It decrypts the first layer of encryption and this reveals the next destination on the network of the packet.
  20. The second and third rings… • When the data packet arrives at the second router, that knows which computer sent it but does not know the original source (this was stripped off in the decryption process by the first router) and nor does it know the final destination. • The second computer decrypts the next layer and finds the third router. • It then forwards the packet on. • The third router, referred to as the ‘exit node’ knows which computer forwarded it the message but not the first computer and certainly not the original sender. It then decrypts the third layer and reveals the final destination. • It then send the packet on to the proper internet which routes it on.
  21. R RR Onion router Onion router Onion router Onion router Onion router Onion router R R R R R Internet TOR Network
  22. Normal packets vs TOR packets Sender To Packet contents (may be encrypted) First layer of encryption contains ‘from’ and ‘location’ of 2 TOR router. Second layer of encryption contains location of 1st router and 3rd TOR router. Third layer of encryption contains location of 2nd router and final destination.Packet contents, (may be encrypted) sender information removed.
  23. R RR Onion router Onion router Onion router Onion router Onion router Onion router R R R R R Internet If eve attacks…
  24. Eve… • Eve can see someone communicating with Bob. • But cannot see what is being said due to encryption. • And cannot identify who Alice is due to TOR. • Eve is not pleased. hdsuieFGjhnakxjkTjslzsnckT nakjUI12hasjmn9Hjkasdjh ? Alice’s identity unknown Content of message unreadable
  25. Hidden sites - The dark web • TOR allows people to browse and visit websites without being identified. • For many this is considered a good thing. • But is also has a further application that is slightly more problematic use. • Hidden sites and services. • These are sites and services that are only viewable through the TOR browser. • They have a different suffix and no useful address: xgter$67asn.onion • They can’t been seen by normal browsers and there are two ways they hide….
  26. Hidden services - 2 ways of hiding No. 1 No spiders allowed. • The hidden services are not indexed by search engines • (Week 1 we discussed how search engines work - spiders crawl web sites identify content and then send it back to the search engine for indexing). • Spiders cannot get onto the TOR network and are denied access to hidden services on TOR. • So the content of dark net sites cannot be found in the normal way.
  27. No. 2 Web browsers can’t reach them • The name of a web site is designed for people. • These are translated into computing language by a computer called a Domain Name Server (DNS) this contains a list of where the web site is stored for a particular name. • When you visit a website your browser consults this list and brings up the correct site. • Onion sites do not register with the official DNS registry so cannot be found. • A normal browser will not know what to do with the address to be able to reach the website. • Instead TOR browsers send a encrypted message to TOR servers – this goes through a multistep process before revealing allowing the browser to display the page.
  28. Disadvantages of TOR… • Speed – because of the complex encryption it can be slow. Watching video not really an option. • Alternatives using p2p eg Ip2 are faster. • The slow speed makes sit vulnerable to traffic analysis – they can see continually slow interactions, isolate them and see if anything can be gleaned from them. • Security – recently some big attacks have been made public- traffic analysis possible - some even argue that though the ideas are strong the implementation has been ‘holed’. • If all three nodes are owned by the same person your id is revealed. • If your data is not encrypted the exit node sees everything you send – user names for accounts. These will of course help to reveal who you are… • It can be blocked – the Great Firewall of China (legislative and technical means to limit China’s internet interaction with the outside world) has stopped TOR services working in China. (Iran has blocked it however)
  29. Conclusion • A partial solution to traffic analysis problem for anonymity. • Needs other actions to fully work. • Relies on encryption technology. • Very useful for journalists and similar. • Also used by deviants to establish new markets – more on this next week.
Anúncio