[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Tor users can be de-anonymised by analysing router information
On 11/15/2014 06:04 AM, Snehan Kekre wrote:
> Research undertaken between 2008 and 2014 suggests that more than 81% of Tor
> clients can be â??de-anonymisedâ?? â?? their originating IP addresses revealed â?? by
> exploiting the â??Netflowâ??
> <http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-netflow/index.html> technology
> that Cisco has built into its router protocols, and similar traffic analysis
> software running by default in the hardware of other manufacturers.
>
> Professor Sambuddho Chakravarty
> <https://sites.google.com/site/sambuddhochakravarty/>, a former researcher at
> Columbia Universityâ??s Network Security Lab <http://nsl.cs.columbia.edu/> and now
> researching Network Anonymity and Privacy at the Indraprastha Institute of
> Information Technology in Delhi, has co-published a series of papers over the
> last six years outlining the attack vector, and claims a 100% â??decloakingâ??
> success rate under laboratory conditions, and 81.4% in the actual wilds of the
> Tor network.
>
> Chakravartyâ??s technique
> <https://mice.cs.columbia.edu/getTechreport.php?techreportID=1545&format=pdf&> [PDF]
> involves introducing disturbances in the highly-regulated environs of Onion
> Router protocols using a modified public Tor server running on Linux - hosted at
> the time at Columbia University. His work on large-scale traffic analysis
> attacks in the Tor environment has convinced him that a well-resourced
> organisation could achieve an extremely high capacity to de-anonymise Tor
> traffic on an ad hoc basis â?? but also that one would not necessarily need the
> resources of a nation state to do so, stating that a single AS (Autonomous
> System) could monitor more than 39% of randomly-generated Tor circuits.
>
> Chakravarty says: /â??â?¦it is not even essential to be a global adversary to launch
> such traffic analysis attacks. A powerful, yet non- global adversary could use
> traffic analysis methods [â?¦] to determine the various relays participating in a
> Tor circuit and directly monitor the traffic entering the entry node of the
> victim connection,â??/
>
> The technique depends on injecting a repeating traffic pattern â?? such as HTML
> files, the same kind of traffic of which most Tor browsing consists â?? into the
> TCP connection that it sees originating in the target exit node, and then
> comparing the serverâ??s exit traffic for the Tor clients, as derived from the
> routerâ??s flow records, to facilitate client identification.
>
> Tor is susceptible to this kind of traffic analysis because it was designed for
> low-latency. Chakravarty explains: /â??//To achieve acceptable quality of service,
> [Tor attempts] to preserve packet interarrival characteristics, such as
> inter-packet delay. Consequently, a powerful adversary can mount traffic
> analysis attacks by observing similar traffic patterns at various points of the
> network, linking together otherwise unrelated network connections.â??/
>
> The online section of the research involved identifying â??victimâ?? clients in
> Planetlab <https://www.planet-lab.org/> locations in Texas, Belgium and Greece,
> and exercised a variety of techniques and configurations, some involving control
> of entry and exit nodes, and others which achieved considerable success by only
> controlling one end or the other.
>
> Traffic analysis of this kind does not involve the enormous expense and
> infrastructural effort that the NSA put into their FoxAcid Tor redirects
> <http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity>,
> but it benefits from running one or more high-bandwidth, high-performance,
> high-uptime Tor relays.
>
> The forensic interest
> <https://www.cryptocoinsnews.com/how-fbi-illegally-hacked-silk-road-servers-find-alleged-pirate-ross-ulbricht/> in
> quite how international cybercrime initiative â??Operation Onymousâ?? defied Torâ??s
> obfuscating protocols to expose
> <http://thestack.com/operation-onymous-seize-hundreds-underground-drug-weapons-cybermarkets-071114> hundreds
> of â??dark netâ?? sites, including infamous online drug warehouse Silk Road 2.0, has
> led many to conclude that the core approach to deanonymisation of Tor clients
> depends upon becoming a â??relay of choiceâ?? â?? and a default resource when
> Tor-directed DDOS attacks put â??amateurâ?? servers out of service
> <http://www.coindesk.com/silk-road-2-0-shrugs-sophisticated-ddos-attack/>.
I also recommend his PhD thesis:
Sambuddho Chakravarty (2014) Traffic Analysis Attacks and Defenses in
Low Latency Anonymous Communication
http://www.cs.columbia.edu/~angelos/Papers/theses/sambuddho_thesis.pdf