Title | Tor: The Second-Generation Onion Router [Link] | ||||||
Author | Roger Dingledine, Nick Mathewson and Paul Syverson | arma@freehaven.net | |||||
Publishing | 13th USENIX Security Symposium | Year | 2004 | ||||
Abstract | We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. | ||||||
Summary | I. Overview
2. Related Work Mix-Net, Babel, Mix-master, Mixminion, Anonymizer, Java Anon Proxy, PipeNet, ISDN mixes, Tarzan, MorphMix, Crowds, Hordes, Herbivore, P5, Freedom, Cebolla, Anonymity Network, … 3. Design goals and assumptions
4. The Tor Design
5. Rendezvous Points and hidden services
6. Other design decisions
7. Attacks and Defenses
|
||||||
Note | One of the best papers in terms of anonymity implementation. The tor is currently one of the largest deployed anonymous network over the world. Although there are a variety of conceptually anonymous networks and several ones in practice, tor is the most popular (as of now having millions of users) amongst them.This paper presents a circuit-based low-latency anonymous communication service. It addresses the limitations for the first tor implementation by adding a large number of features such as perfect forward secrecy, directory servers, integrity checking, configurable exit policies, and location-hidden services via rendezvous points.As authors mentioned, one of the biggest problem would be exit abuse, however, this might be remediated if end-to-end confidentiality have been used. One of side effects is to take advantage of high-level anonymity for the malicious purpose like spreading malware, exploit routes to avoid being kept track and/or IP laundry, which seems obvious now. |
Category: Anonymity
Malware and its Use of Implemented Anonymous Networks
The anonymous networks below are implemented ones, which might be used as hiding malware trace.
a. 토르 네트워크에 접속하려는 자는 우선 디렉토리 노드에서 노드 리스트를 받아 선택한다.
b. 경로에 참여하는 노드 (선택된 노드)는 디피-헬만 키 교환 알고리즘을 통해 세션 키를 생성한다. (TLSv1 상에서)
c. 각 노드는 공개키 스키마를 이용해 라우팅 정보를 포함해 모든 데이터를 암호화한다.
중간 노드는 트래픽이 온 바로 이전 노드와 트래픽을 전송할 바로 다음 노드만 알고 있다. 따라서 마지막 노드를
제외한 노드는 트래픽을 추적할 수 없다.
d. 접속자는 사용할 경로를 여러 개 생성한 다음 이전 세션이 종료되면 다른 경로를 택해 전송한다.
a. The directory node provides node list to originator to choose nodes.
b. Each participating node does Diffie-Hellman key exchange to create session key. (over TLSv1)
c. Each node encrypts all data including routing information with public key scheme.
The node only understands the previous node which this traffic comes from and the next node which it goes to.
Therefore, there is no way to trace the traffic back except exit node.
d. The originator creates several circuits to make use of, and change a new chain when old session is over.
Freenet is a separate network that runs over the Internet. However, other than tor, its content can be accessed only through Freenet including: Freesites (websites on Freenet), in-Freenet chat forums (FMS, Sone, etc), files shared within Freenet, and in-Freenet email.
It has a large distributed database. Thus the more popular a file or page, the more widely it will be cached and the faster it will download. With an appropriate key, Freenet returns the proper file which a user have requested. Here is the location to store data: C:\Users\[UserID]\AppData\Local\Freenet\datastore. There is little or no control over what is stored in the datastore folder as you might imagine.
There are four different keys associated with contents, and you have to get access to them with fproxy.
Gnunet은 2001년도에 시작한 프로젝트로 안전한 p2p 네트워크를 목적으로 하고 있다. ECRS라는 컨텐츠 인코딩 방식을 사용하며 검열에 대응한 파일 공유 기법이다. 정식 웹사이트에서는 중앙 데이터베이스를 사용하지 않은 안전한 개별 간 네트워킹 프레임워크를 사용한다고 소개한다.
Gnunet은 주로 파일 공유를 목적으로 하며 실제 웹을 통한 접속은 tor를 이용하라고 권고한다. 파일 공유, 검색, 분배, 캐싱 등을 익명으로 할 수 있도록 설계한 대표적인 익명 네트워크다.
Gnunet has started in late 2001. It also aims to implement for secure peer-to-peer networking. It uses improved content encoding: ECRS or the encoding for censorship resistant sharing. Accroding to Gnunet official website, it is a framework for secure peer-to-peer networking that does not use any centralized database.
Gnunet mainly focuses on anonymous censorship-resistant file-sharing, which provides anonymity by
. making messages originating from a peer indistinguishable from messages that the peer is routing
. acting as routers and use link-encrypted connections with stable bandwidth utilization
It is similar to tor, but limited to share files anonymously, searching, swarming, and caching.
I2P has begun in 2003, which is an anonymizing network, a low latency mix network. According to the original designers, the goal is to to produce a low latency, fully distributed, autonomous, scalable, anonymous, resilient, and secure network. All data is wrapped with several layers of encryption. (End-to-End) This is called Garlic Routing. I2P is made up of a set of nodes (“routers”) with a number of unidirectional inbound and outbound virtual paths (“tunnels”).
The network is both distributed and dynamic, with no trusted parties and no centralized resources. Moreover it has its own internal network database (using a modification of the Kademlia algorithm) for distributing routing and contact information securely.
Anonymizing Activities: Tor (The Onion Routing)
사람들이 오프라인 상에서 자신만의 공간을 추구하듯이 온라인 상에서도 익명성을 요구하는 노력이 진행되었는데 대표적인 결과물이 tor(The Onion Routing)다. 토르는 인터넷 상에서 프라이버시와 보안을 향상시킬 수 있는 가상 터널 네트워크라고 정의하고 있다. (https://www.torproject.org/about/overview.html.en#overview)
- 동작원리: 각 노드는 자신만의 키 쌍을 가지고 라우터 역할을 하는데 공개키로 라우팅 정보를 암호화하여 다음 노드는 이전 경로를 알 수 없도록 함
- 마지막 노드(exit node)에서 데이터를 볼 수 있는데 이를 악용하는 경우도 있음
- 익명성은 강화되지만 속도가 느리다는 단점이 있음
- SOCKS와 HTTPS를 지원함
Anonymizing Activities: Tor(The Onion Routing)
대표적으로 구현한 소프트웨어는 다음과 같다.
오래 전 Bruce Schneier은 자신의 블로그에서 관련된 공격(MITM)에 대해 논의된 바 있으며 공식 웹사이트에서도 익명성에 대한 공격 가능성을 언급한다.
- http://www.schneier.com/blog/archives/2007/12/maninthemiddle.html
- https://blog.torproject.org/running-exit-node
또한 tor 경유지 노드 또는 마지막 노드 현황은 아래 링크에서 찾을 수 있으니 참고하자.