Tor Bruce Maggs relying on materials from

Slides:



Advertisements
Similar presentations
Bc. Oldřich Faldík Bc. Tomáš Pavlacký Bc. Ondřej Matulík Tor – anonymity online.
Advertisements

Tor: The Second-Generation Onion Router
A look into Bullet Proof Hosting November DefCamp 5 Silviu Sofronie – Head of Forensics
VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation By : Shrinivas G. Deshpande Advisor: Dr. Chung E.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
King of Limitations Present by: Ao-Jan Su. Accuracy? Accuracy depends on the distance of end hosts and their authoritative name servers. Not true for.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Tor61. R2 Open Opened Created Create Relay (Extend) Relay (Extended) Create Created Time P P P P.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
The Anonymous File Transfer Network
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Certificates ID on the Internet. SSL In the early days of the internet content was simply sent unencrypted. It was mostly academic traffic, and no one.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Secure Socket Layer (SSL)
Anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Lies, damn lies and Web statistics A brief introduction to using and abusing web statistics Paul Smith, ILRT July 2006.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Module 5: Configuring Access for Remote Clients and Networks.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
CS 3700 Networks and Distributed Systems Anonymous Communications (Wave Hi to the NSA) Revised 8/21/15.
SOCKS (SOCKet Secure) Presentation by: Group KangKong
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Building Security into Your System Bill Major Gregory Ponto.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
An analysis of Skype protocol Presented by: Abdul Haleem.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
MIS Week 13 Site:
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Can SSL and TOR be intercepted? Secure Socket Layer.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
The Silk Road: An Online Marketplace
Nathaniel Ley CIS235 Dec. 09, Why do we need Tor?  Encryption is not enough to ensure complete anonymity, since packet headers can still reveal.
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Quiz 2 Post-Mortem Bruce Maggs. 2 Create a new BitCoin address, and use it only once. E.g., create a new wallet. Create a new address and mine a BitCoin.
Tor Bruce Maggs relying on materials from
ROGER DINGLEDINE, NICK MATHEWSON, PAUL SYVERSON THE FREE HAVEN PROJECT &NAVAL RESEARCH LAB PRESENTED BY: COREY WHITE Tor: The Second-Generation Onion Router.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Can SSL and TOR be intercepted? Secure Socket Layer.
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Skype.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Anonymous Internet Protocols
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Exercise ?: TOR.
0x1A Great Papers in Computer Security
Firewalls Jiang Long Spring 2002.
Anonymity (Privacy) Suppose you are surfing the Web.
Install AD Certificate Services
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Bruce Maggs relying on materials from
Presentation transcript:

Tor Bruce Maggs relying on materials from

2

How Tor Works 3

4

5

Encryption Keys in TOR Each relay has a long-term ``identity’’ public/private key pair used to sign TLS certificates (public keys signed by directory) Medium-term (one week) public/private ``onion’’ keys are used to decrypt requests to extend circuits – so first node can’t spoof the whole path Short-term “connection” keys used to negotiation TLS connections 6

How Tor Works 7

Bridge Relays (a.k.a. Bridges) Some ISPs/governments block all traffic to relays that appear in the Tor directory. Bridges are relays that don’t appear in the directory. User has to solve the problem of finding a bridge. 8

Solve a Captcha to get Bridge Address 9

10

Growth of Tor Network 11

Growth of Tor Network 12

Spike in Number of Users 13

Possible Explanation for Spike Botnet “Mevade.A” a.k.a. “Sefnit” a.k.a. “SBC” is using Tor for connectivity botnet-cause-of-recent-tor-network- overload/ 14

15

Tor Exit Nodes See Plaintext! 16

Tor Browser 17

Tor Browser 18

19

Tor-Aware Web Servers 20 Connect directly to Tor, do not advertise their network addresses.

Establishing a Hidden Service 21

Establishing a Hidden Service 22

Finding a Hidden Service 23

Contacting a Hidden Service 24

Contacting a Hidden Service 25

Communicating with a Hidden Service 26

Using Tor as a SOCKS5 Proxy Can tunnel any TCP connection through Tor (and DNS requests) First run the Tor browser, it will also act as a SOCKS5 proxy and accept connections Configure your application, e.g., chat, to use as SOCKS5 proxy 27

Configure HexChat to use Proxy 28

Now Chatting through Tor 29

4 30