(SHREL) Open Source Multi-Hop Networks (SHREL) Tor



Similar documents
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

, ) I Transport Layer Security

Internet Privacy Options

Examining How The Great Firewall Discovers Hidden Circumvention Servers

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview. SSL Cryptography Overview CHAPTER 1

Security vulnerabilities in the Internet and possible solutions

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Chapter 7 Transport-Level Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Midterm. Name: Andrew user id:

Bit Chat: A Peer-to-Peer Instant Messenger

TLS and SRTP for Skype Connect. Technical Datasheet

Protocol Rollback and Network Security

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

Format-Transforming Encryption

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson

Secure Sockets Layer

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Lab 7. Answer. Figure 1

Chapter 17. Transport-Level Security

SSL/TLS: The Ugly Truth

Chapter 10. Network Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Filter Avoidance and Anonymous Proxy Guard

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Web Security Considerations

Transport Level Security

Early Recognition of Encrypted Applications

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Web Security. Mahalingam Ramkumar

Topics in Network Security

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

, SNMP, Securing the Web: SSL

Savitribai Phule Pune University

True False questions (25 points + 5 points extra credit)

Examining Proxies to Mitigate Pervasive Surveillance

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Yealink Technical White Paper. Contents. About VPN Types of VPN Access VPN Technology... 3 Example Use of a VPN Tunnel...

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Free software GNU/Linux TOR project

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

What is network security?

Slitheen: Perfectly imitated decoy routing through traffic replacement

Key Management (Distribution and Certification) (1)

Communication Systems SSL

Chapter 8. Network Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 7: Network security

mod_ssl Cryptographic Techniques

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Cornerstones of Security

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Security. Learning Objectives. This module will help you...

The Challenges of Stopping Illegal Peer-to-Peer File Sharing

CS 3251: Computer Networking 1 Security Protocols I

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

How To Protect Your Data From Attack

Network Security Essentials Chapter 5

Dust: A Blocking-Resistant Internet Transport Protocol

Description: Objective: Attending students will learn:

SENSE Security overview 2014

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Cleaning Encrypted Traffic

SSL Inspection Step-by-Step Guide. June 6, 2016

Client Server Registration Protocol

Compter Networks Chapter 9: Network Security

Instructions on TLS/SSL Certificates on Yealink Phones

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, , Web, DNS, and Network Management. Maximum Points: 60

Digital tools to empower civil society

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Lightweight Security using Identity-Based Encryption Guido Appenzeller

Secure Use of the New NHS Network (N3): Good Practice Guidelines

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Is Your SSL Website and Mobile App Really Secure?

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Network Security Protocols

Communication Security for Applications

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

[SMO-SFO-ICO-PE-046-GU-

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

IP Security. Ola Flygt Växjö University, Sweden

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

SSL DOES NOT MEAN SOL What if you don t have the server keys?

Playing Server Hide and Seek.

Transcription:

TOP SECRETHSPREL TO USAyVEY (C//REL) Types of TAT Advanced Open Source Multi-Hop (SHREL) Open Source Multi-Hop Networks (SHREL) Tor (SHREL) Very widely used worldwide (SHREL) Open Source (S/REL) Active Development (SiiREL) Mitigates Threats (SHREL) Very Secure (SHREL) Low enough latency for most TCP uses (SHREW Still the King of high secure, low latency Internet Anonymity (SHREW There are no contenders for the throne in waiting TOP SECRET11COMPs4T REL TO USA, 3S big

TOP SECRETHSIHREL TO LI SAYVEY (S//REL) Tor Operation (1) Ell) How Tor Works: 1 Tor node = unoncryptod link oncryptad link Alice Step 1: Alice's Tor client obtains a list of Tor nodes from - a directory server. Jane w- V Dave - Bob TOP SECRETI/COMP.`,JT REL TO USA,FVEY

TOP SECRET//SI//REL TO LISAYVEY (S/REL) Tor Operation (2) V Ell) How Tor Works: 2 CO1 Tor node unencrypted Ilnk encrypted link Alice Step 2: Alice's Tor client picks a random path to destination server. Green links are encrypted, red links are in the clear., Guard El -N-cd--,.. -- Middle el IMMILnoiP Jane Dave Bob Exit TOP SECRETI/COMINT R

TOP SECRET, :SI. REL. TO USA,FVEY S//SI//REL) Passive Tor Traffic Analysis (Si/SWREL) For Normal SIG1NT flow, need to identify Tar traffic! (Si/SIHREL) Only outer TLS layer visible How to Distinguish? (Si/SIHREL) Tor developers attempt to remain anonymous by blending in with myriad other TLS traffic (Si/Sli/REL) Tor TLS has changed over the years (Si/SIHREL) There ARE some server client features which are recognizable (SJ/SIBREL) Certificate: Specific Diffie -Heilman (DH) Modulus by:e search (S/iSli/REL) Certificate: Issuer and Subject random names of same form ex: CN=www.ofzfkdfioirss.net regex match (Si/SU/FREW Certificate: always 2 hour lifetime ASN. 1 parsing, more computation (511 1) Multiple XKS fingerprints from multiple parties deployed TOP SECRETI/COMINT REL TO USA,FVEY 43 _

TOP SECREP/SPREL TO USA,FVEY (S//REL) Tor Project Censorship Driven Activity I 11,4 4 (SHIREL) Driven by Censorship Circumvention, Hide Signature (Si/REL) China and Iran still main adversaries (SHREL) Researching better bridge distribution strategies (S//REL) Claim by Tor Project is 8000 requests/day for <1000 total (SHREL)Around Feb 2011, changed the TLS handshake (S//REL) Signature more like Apache web-server (SHREW Different OH Modulus (SHSWREL) New XKS Signatures address this (TS//Sl//REL) Proposed eventual change will kill identification! (Si/REL) Each Tor node will generate random-ish signatures in a volatile way specifically designed to look like normal vvebsite TLS traffic! I : 1 TOP SECRETlICOMINT REL TO USA,FVEY

TOP SECRET8SPREL TO USA.FVEY (SHREW Censorship Driven Protocol Obfuscation Psiphon 31 Tor 4H (SIIREL) Extreme Censorship blocking: Common encrypted protocols (SHREW In the case of Psiphon 3: SSH (SIIREL) In the case of Tor: TLS (SIIREL) Make deep packet inspection (XKS :-)) work harder (SHREW Both use work of a open source project (brliobfuscated-openssh) SHREL) Idea is both sides transmit random seed and verifier information (SIIREL) Verifier is hash of seed and other data (SHREW If verifier passes data used from both side seeds to generate key (SIIREL) Key used in symmetric cipher to encrypt native SSH or SSL protocol (SIIREL) So for random stream, need to de-obfuscate and test for SSH I SSL (SIIREL) Details for Psiphon 3 (SIIREL) Hash used for verifier, key generation: 6000 iterations SHA-1 (SIIREL) Symmetric cipher is RC-4 (SIIREL) Details for Tor Obsfproxy (SIIREL) Hash used for verifier, key generation: 100K iterations SHA-256 (SIIREL) Symmetric cipher is AES-CTR-128 (I/l Key uses seed from both sides! TOP SECRETI/COMINT REL TO USA,FVEY - 45

TOP SECRET//SIPREL TO USA,FVEY (S//REL) Tor Project and friends Recent Activity. (S/REL) Tor on non-traditional platforms (SHREW ORBOT, Tor for Android smartphones Associated browser, easy to use! (SHREW Tor Router Project Modified Linksys Router (everything over Tor) (SHREW Hide-My-IP-Address (Si/REL) Proprietary replacement for Tor Browser Bundle (Si/REL) From RWCCL Network' not part of Tor Project (SifSli/REL) Looked at based on reference by CT target (SHREL) Tor Project working on improving support for circumvention (SHIREL) Handshake obfuscation (discussed) (Si/REL) Better bridge proliferation / distribution (SHREL) Tails: Complete Bootabie OS on CD for anonymity includes Tor (Si/REL) Adds Severe CNE misery to equation (Si/Sli/REL) Has been discussed by CT targets TOP SECRETliCOMINT REL TO USA,FVEY - - 46

TOP SECRET/SPREL TO USA,FVEY (S//REL) Tor Project and friends Recent Activity (SHREL) Advanced Tor "Obfuscation" Project: SkypeMorph (SHREL) Another option for pluggable transport (S//REL) More sophisticated concept than Obfsproxy (SHREL) Open connection to Skype server with "bridge Skype ID" (SHREL) Encapsulate Tor in encrypted data mimicking Skype Video Traffic (SHREL) Sort of traffic flow steganography vice content steganography (SHREL) True Public Key cryptography vice obfuscation with known key (SHREL) Product of University research Non-trivial to deploy (TS/iSIHREL) Most Recent SIGINT Work on Exploiting Tor (TS//SI//REL) REMATION II Workshop (US/UK) at MHS spring 2012 (SUSIHREL) Unleashed NetworkinglCNE legions... (SHREL) See later talk by for the scoop IrPORWMIP TOP SacREDICOMINT REL TO USA,FVEY

TOP SECREP/SPREL TO USA,FVEY (S//REL) Tor Project and friends Recent Activity -(Si/REL) Online Feud between 2 1AT Products: Ultrasurf and Tor - (S/REL) " Technical Analysis of the Ultrasurf proxying software" (Applebaum) - (S//REL) Analysis (including some SRE) - highly critical - (SHREW Single hop, controlled by one authority - (S//REL) Security by obscurity - (S//REL) No perfect forward secrecy (forensic traces exploitable) - (SHREW Responsible Disclosure: Uitrasurf notified 12/2011, published 04/2012 (S//REL) "Tor's critique of Uitrasurf: A reply from the Ultrasurf developers"» (SHREW Posted on Ultrasunc site days after Tor published critique» (SHREW All talk and no show» (Si/REL) Not fully analyzed» (S//REL) One Approach to IAT: Tor - higher anonymity, smaller scale TOP SECRETi/COMPs4T REL TO USA,FVEY _