Bruce Maggs relying on materials from

Slides:



Advertisements
Similar presentations
Tor: The Second-Generation Onion Router
Advertisements

By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
The Anonymous File Transfer Network
Aaron Johnson U.S. Naval Research Laboratory CSci 6545 George Washington University 11/18/2013.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Lies, damn lies and Web statistics A brief introduction to using and abusing web statistics Paul Smith, ILRT July 2006.
Module 5: Configuring Access for Remote Clients and Networks.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Tunneling and Securing TCP Services Nathan Green.
MIS Week 13 Site:
Overview  Anonymity systems  Review of how Tor works  Tor Project Inc.  Helper tools and accessories  Advanced Tor control  Attack Vectors.
The Silk Road: An Online Marketplace
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Tor Bruce Maggs relying on materials from
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Tor Bruce Maggs relying on materials from
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Skype.
Systems Architecture Anonymous Key Agreement Dominik Oepen
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Anonymous Internet Protocols
Contents Software components All users in one location:
SFS-HTTP: Securing the Web with Self-Certifying URLs
NET 536 Network Security Firewalls and VPN
Tor Good + Evil.
Security in the layers 8: Network Security.
The Onion Router Hao-Lun Hsu
Intro to Ethical Hacking
Secure Sockets Layer (SSL)
Tor Internals and Hidden Services
Practical Censorship Evasion Leveraging Content Delivery Networks
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Intro to Ethical Hacking
IPSec VPN Chapter 13 of Malik.
Tutorial on Creating Certificates SSH Kerberos
Christo Wilson Revised 8/21/15
Misc. Security Items.
Roger Dingledine Jacob Appelbaum
Using SSL – Secure Socket Layer
2018 Real Cisco Dumps IT-Dumps
Exercise ?: TOR.
Privacy Through Anonymous Connection and Browsing
Server-to-Client Remote Access and DirectAccess
Reactive Android Development
0x1A Great Papers in Computer Security
SSH SSH is “Secure SHell” Secure, compressed, widely supported, fast
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Firewalls Routers, Switches, Hubs VPNs
Anonymous Communication
Firewalls Jiang Long Spring 2002.
Quiz 1 Post-Mortem Bruce Maggs.
Firewalls.
Anonymity (Privacy) Suppose you are surfing the Web.
Install AD Certificate Services
Certificate Revocation
Introduction to Network Security
Anonymous Communications
Bruce Maggs relying on materials from
Building Security into Your System
Homework 8 Operating Systems CS 3430 Sarah Diesburg.
Designing IIS Security (IIS – Internet Information Service)
Anonymous Communication
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Anonymous Communication
Bruce Maggs relying on materials from
Presentation transcript:

Bruce Maggs relying on materials from http://www.torproject.org Tor Bruce Maggs relying on materials from http://www.torproject.org

How Tor Works (directory server)

How Tor Works

Encryption Keys in TOR Each relay has a long-term ``identity’’ public/private key pair used to sign TLS certificates (public keys signed by directory) Medium-term (one week) public/private ``onion’’ keys are used to decrypt requests to extend circuits – so first node can’t spoof the whole path. These keys are deleted so that if relay is compromised, old traffic can’t be decrypted. Short-term “connection” or “ephemeral” shared private keys are used to encrypt connections.

How Tor Works

Bridge Relays (a.k.a. Bridges) Some ISPs/governments block all traffic to relays that appear in the Tor directory. Bridges are relays that don’t appear in the directory. User has to solve the problem of finding a bridge.

Solve a Captcha to get Bridge Address

Growth of Tor Network

Growth of Tor Network

Spike in Number of Users

Possible Explanation for Spike Botnet “Mevade.A” a.k.a. “Sefnit” a.k.a. “SBC” is using Tor for connectivity http://blog.fox-it.com/2013/09/05/large-botnet-cause-of-recent-tor-network-overload/

Tor Exit Nodes See Plaintext! http://archive.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=all

Tor Browser

Tor Browser

Tor-Aware Web Servers Connect directly to Tor, do not advertise their network addresses.

Establishing a Hidden Service

Establishing a Hidden Service

Finding a Hidden Service

Contacting a Hidden Service

Contacting a Hidden Service

Communicating with a Hidden Service

Using Tor as a SOCKS5 Proxy Can tunnel any TCP connection through Tor (and DNS requests) First run the Tor browser, it will also act as a SOCKS5 proxy and accept connections Configure your application, e.g., chat, to use 127.0.0.1 as SOCKS5 proxy

Configure HexChat to use Proxy

Now Chatting through Tor

4