users get routed: traffic correlation on tor by realistic adversaries aaron johnson 1 chris wacek 2...

75
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval Research Laboratory, Washington, DC 2 Georgetown University, Washington, DC MPI-SWS July 29, 2013 1

Upload: jaden-mullinix

Post on 02-Apr-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

1

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

Aaron Johnson1 Chris Wacek2 Rob Jansen1

Micah Sherr2 Paul Syverson1

1 U.S. Naval Research Laboratory, Washington, DC2 Georgetown University, Washington, DC

MPI-SWSJuly 29, 2013

Page 2: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

2

Summary: What is Tor?

Page 3: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

3

Tor is a system for anonymous communication.

Summary: What is Tor?

Page 4: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

4

Summary: What is Tor?

Tor is a system for anonymous communication.popular^

Over 500000 daily users and 2.4GiB/s aggregate

Page 5: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

5

Summary: Who uses Tor?

Page 6: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

6

Summary: Who uses Tor?

• Individuals avoiding censorship

• Individuals avoiding surveillance

• Journalists protecting themselves or sources

• Law enforcement during investigations

• Intelligence analysts for gathering data

Page 7: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

7

Summary: Tor’s Big Problem

Page 8: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

8

Summary: Tor’s Big Problem

Page 9: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

9

Summary: Tor’s Big Problem

Page 10: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

10

Summary: Tor’s Big Problem

Page 11: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

11

Summary: Tor’s Big Problem

Traffic Correlation Attack

Page 12: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

12

Summary: Tor’s Big Problem

Traffic Correlation Attack• Congestion attacks• Throughput attacks• Latency leaks

• Website fingerprinting• Application-layer leaks• Denial-of-Service attacks

Page 13: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

13

Summary: Our Contributions

Page 14: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

14

Summary: Our Contributions

1. Empirical analysis of traffic correlation threat

2. Develop adversary framework and security metrics

3. Develop analysis methodology and tools

Page 15: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

15

Overview• Summary• Tor Background• Tor Security Analysis

o Adversary Frameworko Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 16: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

16

Overview• Summary• Tor Background• Tor Security Analysis

o Adversary Frameworko Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 17: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

17

Users DestinationsOnion Routers

Background: Onion Routing

Page 18: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

18

Users DestinationsOnion Routers

Background: Onion Routing

Page 19: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

19

Users DestinationsOnion Routers

Background: Onion Routing

Page 20: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

20

Users DestinationsOnion Routers

Background: Onion Routing

Page 21: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

21

Users DestinationsOnion Routers

Background: Onion Routing

Page 22: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

22

Background: Using Circuits

Page 23: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

23

Background: Using Circuits

1. Clients begin all circuits with a selected guard.

Page 24: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

24

Background: Using Circuits

1. Clients begin all circuits with a selected guard.2. Relays define individual exit policies.

Page 25: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

25

Background: Using Circuits

1. Clients begin all circuits with a selected guard.2. Relays define individual exit policies.3. Clients multiplex streams over a circuit.

Page 26: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

26

Background: Using Circuits

1. Clients begin all circuits with a selected guard.2. Relays define individual exit policies.3. Clients multiplex streams over a circuit.4. New circuits replace existing ones periodically.

Page 27: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

27

Overview• Summary• Tor Background• Tor Security Analysis

o Adversary Frameworko Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 28: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

28

Adversary Framework

Page 29: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

29

Adversary Framework

Page 30: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

30

Adversary Framework

Page 31: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

31

Adversary Framework

Page 32: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

32

Adversary Framework

Resource Types• Relays• Bandwidth• Autonomous

Systems (ASes)

• Internet Exchange Points (IXPs)

• Money

Page 33: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

33

Adversary Framework

Resource Types• Relays• Bandwidth• Autonomous

Systems (ASes)

• Internet Exchange Points (IXPs)

• Money

Resource Endowment• Destination

host• 5% Tor

bandwidth• Source AS• Equinix IXPs

Page 34: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

34

Adversary Framework

Resource Types• Relays• Bandwidth• Autonomous

Systems (ASes)

• Internet Exchange Points (IXPs)

• Money

Resource Endowment• Destination

host• 5% Tor

bandwidth• Source AS• Equinix IXPs

Goal• Target a given

user’s communication

• Compromise as much traffic as possible

• Learn who uses Tor

• Learn what Tor is used for

Page 35: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

35

Overview• Summary• Tor Background• Tor Security Analysis

o Adversary Frameworko Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 36: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

Prior metrics

Security Metrics

Page 37: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

Prior metrics

1. Probability of choosing bad guard and exita. c2 / n2 : Adversary controls c of n relays

b. ge : g guard and e exit BW fractions are bad

Security Metrics

Page 38: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

Prior metrics

1. Probability of choosing bad guard and exita. c2 / n2 : Adversary controls c of n relaysb. ge : g guard and e exit BW fractions are bad

2. Probability some AS/IXP exists on both entry and exit paths (i.e. path independence)

Security Metrics

Page 39: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

Prior metrics

1. Probability of choosing bad guard and exita. c2 / n2 : Adversary controls c of n relays

b. ge : g guard and e exit BW fractions are bad

2. Probability some AS/IXP exists on both entry and exit paths (i.e. path independence)

3. gt : Probability of choosing malicious guard within time t

Security Metrics

Page 40: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

40

Principles

1. Probability distribution

2. Measure on human timescales

3. Based on adversaries

Security Metrics

Page 41: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

41

Metrics

1. Probability distribution of time until first path compromise

2. Probability distribution of number of path compromises for a given user over given time period

Principles

1. Probability distribution

2. Measure on human timescales

3. Based on adversaries

Security Metrics

Page 42: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

42

Overview• Background• Onion Routing Security Analysis

o Problem: Traffic correlationo Adversary Modelo Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 43: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

43

TorPS: The Tor Path Simulator

User Model Client Software Model

Streams

Network Model

Relay statuses

StreamCircuit mappings

Page 44: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

44

TorPS: The Tor Path Simulator

User Model Client Software Model

Streams

Network Model

Relay statuses

StreamCircuit mappings

Page 45: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

45

TorPS: User Model

20-minute traces

Gmail/GChat

Gcal/GDocs

Facebook

Web search

IRC

BitTorrent

Page 46: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

46

TorPS: User Model

20-minute traces

Gmail/GChat

Gcal/GDocs

Facebook

Web search

IRC

BitTorrent

Typical

Page 47: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

47

TorPS: User Model

20-minute traces

Gmail/GChat

Gcal/GDocs

Facebook

Web search

IRC

BitTorrent

Typical

Session schedule

One session at9:00, 12:00,15:00, and 18:00Su-Sa

Repeated sessions8:00-17:00, M-F

Repeated sessions0:00-6:00, Sa-Su

Page 48: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

48

TorPS: User Model

20-minute traces

Gmail/GChat

Gcal/GDocs

Facebook

Web search

IRC

BitTorrent

Typical

Session schedule

One session at9:00, 12:00,15:00, and 18:00Su-Sa

Repeated sessions8:00-17:00, M-F

Repeated sessions0:00-6:00, Sa-Su

Worst Port (6523)Best Port (443)

Page 49: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

49

Rank Port # Exit BW %

Long-Lived Application

1 8300 19.8 Yes iTunes?

2 6523 20.1 Yes Gobby

3 26 25.3 No (SMTP+1)

65312 993 89.8 No IMAP SSL

65313 80 90.1 No HTTP

65314 443 93.0 No HTTPS

TorPS: User Model

Default-accept ports by exit capacity.

Page 50: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

50

TorPS: User Model

Model Streams/week

IPs Ports (#s)

Typical 2632 205 2 (80, 443)

IRC 135 1 1 (6697)

BitTorrent 6768 171 118

WorstPort 2632 205 1 (6523)

BestPorst 2632 205 1 (443)

User model stream activity

Page 51: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

51

TorPS: The Tor Path Simulator

User Model Client Software Model

Streams

Network Model

Relay statuses

StreamCircuit mappings

Page 52: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

52

TorPS: The Tor Path Simulator

Network Model

metrics.torproject.org

Hourly consensuses

Monthly server descriptors archive

Page 53: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

53

TorPS: The Tor Path Simulator

User Model Client Software Model

Streams

Network Model

Relay statuses

StreamCircuit mappings

Page 54: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

54

TorPS: The Tor Path Simulator

• Reimplemented path selection in Python• Based on current Tor stable version (0.2.3.25)• Major path selection features include

– Bandwidth weighting– Exit policies– Guards and guard rotation– Hibernation– /16 and family conflicts

• Omits effects of network performance

Client Software Model

Page 55: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

55

Overview• Background• Onion Routing Security Analysis

o Problem: Traffic correlationo Adversary Modelo Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 56: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

56

Rank Bandwidth (MiB/s) Family

1 260.5 torservers.net

2 115.7 Chaos Computer Club

3 107.8 DFRI

4 95.3 Team Cymru

5 80.5 Paint

Top Tor families, 3/31/13

Node Adversary

100 MiB/s total bandwidth

Relay Type Number Bandwidth (GiB/s)

Any 2646 3.10

Guard only 670 1.25

Exit only 403 0.30

Guard & Exit 272 0.98

Tor relay capacity, 3/31/13

Page 57: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

57

Node Adversary

100 MiB/s total bandwidth

Probability to compromise at least one stream and rate of compromise, 10/12 – 3/13.

Page 58: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

58

Node Adversary

100 MiB/s total bandwidth83.3 MiB/s guard,16.7 MiB/s exit

Page 59: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

59

Node Adversary Results

Time to first compromised stream, 10/12 – 3/13

Fraction compromised streams, 10/12 – 3/13

Page 60: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

60

Node Adversary Results

Time to first compromised guard, 10/12 – 3/13

Fraction streams with compromised guard, 10/12 – 3/13

Page 61: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

61

Node Adversary Results

Time to first compromised exit, 10/12 – 3/13

Fraction compromised exits, 10/12 – 3/13

Page 62: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

62

Time to first compromised circuit, 10/12-3/13

Node Adversary Results

Page 63: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

63

Overview• Background• Onion Routing Security Analysis

o Problem: Traffic correlationo Adversary Modelo Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 64: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

64

Link Adversary

Page 65: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

65

Link Adversary

AS1 AS2 AS3 AS4 AS5

AS6

AS8

AS7

1. Autonomous Systems (ASes)

AS6

Page 66: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

66

Link Adversary

1. Autonomous Systems (ASes)

2. Internet Exchange Points (IXPs)

AS1 AS2 AS3 AS4 AS5

AS6

AS8

AS7AS6

Page 67: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

67

Link Adversary

1. Autonomous Systems (ASes)

2. Internet Exchange Points (IXPs)

3. Adversary has fixed location

AS1 AS2 AS3 AS4 AS5

AS6

AS8

AS7AS6

Page 68: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

68

Link Adversary

1. Autonomous Systems (ASes)

2. Internet Exchange Points (IXPs)

3. Adversary has fixed location

AS1 AS2 AS3 AS4 AS5

AS6

AS8

AS7AS6

Page 69: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

69

Link Adversary

1. Autonomous Systems (ASes)

2. Internet Exchange Points (IXPs)

3. Adversary has fixed location

4. Adversary may control multiple entitiesa. “Top” ASes

b. IXP organizations

AS1 AS2 AS3 AS4 AS5

AS6

AS8

AS7AS6

Page 70: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

70

Link Adversary

AS/IXP Locations• Ranked for client location

by frequency on entry or exit paths

• Exclude src/dst ASes• Top k ASes /top IXP

organization

Client locations• Top 5 non-Chinese

source ASes in Tor (Edman&Syverson 09)

AS# Description Country

3320 Deutsche Telekom AG Germany

3209 Arcor Germany

3269 Telecom Italia Italy

13184 HanseNet Telekommunikation

Germany

6805 Telefonica Deutschland Germany

Type ID Description

AS 3356 Level 3 Communications

AS 1299 TeliaNet Global

AS 6939 Hurricane Electric

IXP 286 DE-CIX Frankfurt

IXP Org. DE-CIX DE-CIX

Example: Adversary locations for BitTorrent client in AS 3320

Page 71: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

71

Link Adversary# IXP Organization Size Country

1 Equinix 26 global

2 PTTMetro 8 Brazil

3 PIPE 6 Australia

4 NIXI 6 India

5 XChangePoint 5 global

6 MAE/VERIZON 5 global

7 Netnod 5 Sweden

8 Any2 4 US

9 PIX 4 Canada

10 JPNAP 3 Japan

11 DE-CIX 2 Germany

12 AEPROVI 2 Equador

13 Vietnam 2 Vietnam

14 NorthWestIX 2 Montana, US

15 Terremark 2 global

16 Telx 2 US

17 NorrNod 2 Sweden

18 ECIX 2 Germany

19 JPIX 2 Japan

IXP organizations ranked by size

IXP organizations obtained by manual clustering based on PeerDB and PCH.

Page 72: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

72

Link Adversary Adversary controls one AS,Time to first compromised stream, 1/13 – 3/13“Best”: most secure client AS“Worst”: least secure client AS

Adversary controls one AS,Fraction compromised streams,

1/13 – 3/13“Best”: most secure client AS

“Worst”: least secure client AS

Page 73: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

73

Adversary controls top ASes,Time to first compromised stream,1/13 – 3/13,Only “best” client AS

Adversary controls IXP organization,Time to first compromised stream,

1/13 – 3/13,“Best”: most secure client AS

“Worst”: least secure client AS

Link Adversary

Page 74: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

74

Overview• Background• Onion Routing Security Analysis

o Problem: Traffic correlationo Adversary Modelo Security Metricso Evaluation MethodologyoNode Adversary Analysiso Link Adversary Analysis

• Future Work

Page 75: Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries Aaron Johnson 1 Chris Wacek 2 Rob Jansen 1 Micah Sherr 2 Paul Syverson 1 1 U.S. Naval

75

Future Work

1. Extending analysis

2. Improving guard selection

3. Using trust-based path selection to protect against traffic correlation

4. Dealing with incomplete and inaccurate AS and IXP maps

5. Include Tor’s performance-based path-selection features in TorPS