Guard Iat - Tor
Guard Iat - Tor
mi
(S//REL) Open Source Multi-Hop Networks
K
- (S//REL) Tor
»
1
< ! (S//REL) Very widely used worldwide
7
(S//REL) Open Source
k
<s (S//REL) Active Development
(S//REL) Mitigates Threats
— • oncryptod link
Alice
Dave
TOP SECRET//SI//REL TO USA,FVEY
(S//REL) Tor Operation (2)
«
EO HOW Tor Works: 2 IO • •
Tor nodo
unoncryptod link
m — > oncryptod link ».
is h
% v 1
Alice
h
«
2 >l_
Bob
Dave
Exit
1 h *
TOP SECRET//SI//REL TO USA,FVEY
V/ $
I
TO
h
(S//SI//REL) For Normal SIGINT flow, need to identify Tor traffic!
(S//SI//REL) Only outer TLS layer visible How to Distinguish?
(S//SI//REL) Tor developers attempt to remain anonymous by blending in
*
m
*
(S//SI//REL) Tor TLS has changed over the years
' <"i
(S//SI//REL) There ARE some server —» client features which are
I recognizable
- (S//SI//REL) Certificate: Specific Diffie-Hellman
- (S//SI//REL) Certificate: Issuer and Subject random names of same form - ex:
J*'
(S//REL) Driven by Censorship Circumvention, Hide Signature
(S//REL) China and Iran still main adversaries
(S//REL) Researching better bridge distribution strategies
t:
(S//REL) Claim by Tor Project is 8000 requests/day for <1000 total
(S//REL) Around Feb 2011, changed the TLS handshake
(S//REL) Signature more like Apache web-server
(S//REL) Different DH Modulus
(S//SI//REL) New XKS Signatures address this "¿4
(TS//SI//REL) Proposed eventual change will kill identification!
(S//REL) Each Tor node will generate random-ish signatures in a volatile
way specifically designed to look like normal website TLS traffic!
4f t
TOP SECRET//SI//REL TO USA,FVEY
(S//REL) Censorship Driven Protocol Obfuscation - Psiphon 3 / Tor
v¥
s f i
(S//REL) Extreme Censorship blocking: Common encrypted protocols
• (S//REL) In the case of Psiphon 3: SSH
• (S//REL) In the case of Tor. TLS
• (S//REL) Make deep packet inspection (XKS :-)) work harder
• (S//REL) Both use work of a open source project (brl/obfuscated-openssh)
(S//REL) Idea is both sides transmit random seed and verifier information
• (S//REL) Verifier is hash of seed and other data
• (S//REL) If verifier passes data used from both side seeds to generate key
• (S//REL) Key used in symmetric cipher to encrypt native SSH or SSL protocol
• (S//REL) So for random stream, need to de-obfuscate and test for SSH / SSL
(S//REL) Details for Psiphon 3
• (S//REL) Hash used for verifier, key generation: 6000 iterations SHA-1
• (S//REL) Symmetric cipher is RC-4
(S//REL) Details for Tor Obsfproxy
• (S//REL) Hash used for verifier, key generation: 100K iterations SHA-256
• (S//REL) Symmetric cipher is AES-CTR-128
• (S//REL) Key uses seed from both sides!
TOP SECRET//COMINT REL TO USA,FVEY 6
TOP SECRET//SI//REL TO USA,FVEY
(S//REL) Tor Project and friends Recent Activity
V/ $
(S//REL) Tor Router Project - Modified Linksys Router (everything over Tor) M
h
(S//REL) Hide-My-IP-Address • '
J*'
TOP SECRET//SI//REL TO USA,FVEY
(S//REL) Tor Project and friends Recent Activity
ivy $
(S//REL) True Public Key cryptography vice obfuscation with known key
Y
% ss
A
•(S//REL) Online Feud between 2 I AT Products: Ultrasurf and Tor
(S//REL)" Technical Analysis of the Ultrasurf proxying software" (Applebaum)
- (S//REL) Analysis (including some SRE) - highly critical
- (S//REL) Single hop, controlled by one authority 7
A - (S//REL) Security by obscurity
*