On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü...

59
Katharina Kohls Kai Jansen, David Rupprecht, Thorsten Holz Ruhr University Bochum Christina Pöpper NYU Abu Dhabi ON THE CHALLENGES OF GEOGRAPHICAL AVOIDANCE FOR TOR

Transcript of On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü...

Page 1: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

Katharina Kohls

Kai Jansen, David Rupprecht, Thorsten Holz

Ruhr University Bochum

Christina Pöpper

NYU Abu Dhabi

ON THE CHALLENGES OF

GEOGRAPHICAL AVOIDANCE FOR TOR

Page 2: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Tor Anonymity System

Separate endpoints

→Anonymity230.125.195.89

www.sensitive-site.org

On the Challenges of Geographical Avoidance for Tor2

Page 3: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Traffic Analysis Attacks

Metadata leaks information

→De-Anonymization230.125.195.89

www.sensitive-site.org

On the Challenges of Geographical Avoidance for Tor3

Page 4: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Direct Traffic Obfuscation• Direct defenses are expensive:

• Delay transmissions

• Consume resources

Mixing: Additional Delays

Cover Traffic: Exhaust bandwidth

On the Challenges of Geographical Avoidance for Tor4

Page 5: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Alternatives• Direct defenses are expensive:

• Delay transmissions

• Consume resources

Mixing: Additional Delays

Cover Traffic: Exhaust bandwidth

Are there alternative

defenses?

On the Challenges of Geographical Avoidance for Tor5

Page 6: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Geographical AvoidanceThe general concept.

Page 7: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

General Concept

You are here

The server is here

The untrusted

area is here

Page 8: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Standard Circuit

Entry

Middle

Exit

Server

Client

Page 9: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Detect Untrusted Area

Entry

Middle

Exit

Server

Client

1. Detect connection through

untrusted area

Page 10: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Use Better Circuit

Entry

Middle

Exit

Server

Client

1. Detect connection through

untrusted area

2. Discard and create new

circuit

Page 11: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

How can we do this?

Entry

Middle

Exit

Server

Client

1. Detect connection through

untrusted area

2. Discard and create new

circuit

Page 12: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Timing Decisions• Detect connection through untrusted area

• Relays: GeoIP location data

• Routing: Not transparent

• → Measure end-to-end timing

Untrusted Area

Relay

Router

Router

Router

1. D. Levin, Y. Lee, L. Valenta, Z. Li, V. Lai, C. Lumezanu, N. Spring, and B. Bhattacharjee,

“Alibi Routing,” in Conference of the ACM Special Interest Group on Data Communication, SIGCOMM‘15

2. Z. Li, S. Herwig, and D. Levin, “DeTor: Provably Avoiding Geographic Regions in Tor,”

in USENIX Security Symposium, USENIX‘17

Page 13: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Estimate Worst Case1. Find closest point in untrusted area

2. Measure distance between client and point

3. Assume speed, e.g., Τ2 3 speed of light

4. Estimate RTT

Untrusted Area

20ms

𝑅𝑒𝑠𝑡

On the Challenges of Geographical Avoidance for Tor13

Page 14: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Timing Decision1. Find closest point in untrusted area

2. Measure distance between client and point

3. Assume speed, e.g., Τ2 3 speed of light

4. Estimate RTT

• Use threshold for decisions

• 𝑅𝑒2𝑒 < 𝑅𝑒𝑠𝑡

Untrusted Area

Relay

Router

𝑅𝑒2𝑒

𝑅𝑒𝑠𝑡

On the Challenges of Geographical Avoidance for Tor14

Page 15: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Timing Decision1. Find closest point in untrusted area

2. Measure distance between client and point

3. Assume speed, e.g., Τ2 3 speed of light

4. Estimate RTT

• Use threshold for decisions

• 𝑅𝑒2𝑒 < 𝑅𝑒𝑠𝑡

• 𝑅𝑒2𝑒 ≥ 𝑅𝑒𝑠𝑡

Untrusted Area

Relay

Router

Router

Router

𝑅𝑒2𝑒

𝑅𝑒𝑠𝑡

On the Challenges of Geographical Avoidance for Tor15

Page 16: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Challenges of Geo AvoidanceConsiderations for the system design.

Page 17: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Three Classes of Challenges1. Network Diversity

1. Distribution of Relays

2. Varying Connections Lengths

3. Connection Failures

2. Ground Truth

1. GeoIP Location Errors

2. Assymetric Routes

3. Intransparent Transmission Characteristics

3. Deployment

1. Maintaining Tor‘s Performance and Security

2. Using Reliable Information Sources

On the Challenges of Geographical Avoidance for Tor17

72% of Relays in Europe

21% of Relays in North America

Page 18: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Three Classes of Challenges1. Network Diversity

1. Distribution of Relays

2. Varying Connections Lengths

3. Connection Failures

2. Ground Truth

1. GeoIP Location Errors

2. Assymetric Routes

3. Intransparent Transmission Characteristics

3. Deployment

1. Maintaining Tor‘s Performance and Security

2. Using Reliable Information Sources

On the Challenges of Geographical Avoidance for Tor18

EU ↔ EU

4,384 km2,724 miles

NA ↔ NA

19,210 km11,937 miles

Page 19: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Three Classes of Challenges1. Network Diversity

1. Distribution of Relays

2. Varying Connections Lengths

3. Connection Failures

2. Ground Truth

1. GeoIP Location Errors

2. Assymetric Routes

3. Intransparent Transmission Characteristics

3. Deployment

1. Maintaining Tor‘s Performance and Security

2. Using Reliable Information Sources

On the Challenges of Geographical Avoidance for Tor19

~11% of circuits failed12,500 out of 105,889

Page 20: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Three Classes of Challenges1. Network Diversity

1. Distribution of Relays

2. Varying Connections Lengths

3. Connection Failures

2. Ground Truth

1. GeoIP Location Errors

2. Assymetric Routes

3. Intransparent Transmission Characteristics

3. Deployment

1. Maintaining Tor‘s Performance and Security

2. Using Reliable Information Sources

On the Challenges of Geographical Avoidance for Tor20

GeoIP:

6% (330/6042):

provably false location

3.2% (194/6042)

updated country code

Page 21: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Designing the Avoidance System

Network Diversity

Ground Truth

Deployment

Simulation Model

Prototype

On the Challenges of Geographical Avoidance for Tor21

Deployability

Comparison ofApproaches

Page 22: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Prototype: TrilateraTorConsidering the challenges.

Page 23: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Considering the Challenges

Network Diversity

Ground Truth

Deployment

Empirical Timing Decisions

Verification of Relay Locations

Secure Information Sources

Pro

toty

pe

1

2

3

On the Challenges of Geographical Avoidance for Tor23

Page 24: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Network Diversity: Timing Decisions

Upper Bound Decision

Distance:

4,384 km 2,724 miles

Speed:

0.66c (speed of light)

Time:14.62 ms

On the Challenges of Geographical Avoidance for Tor24

1

Page 25: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Empirical Timing Decisions

Upper Bound Decision TrilateraTor

Distance:

4,384 km 2,724 miles

Speed:

0.66c (speed of light)

Time:14.62 ms

7

1114

8

10

12

15

5

Time:

Measure circuits from

remote servers

1

On the Challenges of Geographical Avoidance for Tor25

Page 26: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Hop Relations Table

Upper Bound Decision TrilateraTor

Distance:

4,384 km 2,724 miles

Speed:

0.66c (speed of light)

Time:14.62 ms

Timing Relations

From To Time

A B 13

A C 9

B C 12

A D 22

… … …

1

On the Challenges of Geographical Avoidance for Tor26

Page 27: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Considering the Challenges

Network Diversity

Ground Truth

Deployment

Empirical Timing Decisions

Verification of Relay Locations

Secure Information Sources

Pro

toty

pe

1

2

3

On the Challenges of Geographical Avoidance for Tor27

Page 28: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Ground Truth: Relay Locations• Measuring relay positions

• Send ICMP probes to relays

• Use multiple reference points

• Estimate position using trilateration

Remote Server

Relay

2

On the Challenges of Geographical Avoidance for Tor28

Page 29: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Considering the Challenges

Network Diversity

Ground Truth

Deployment

Empirical Timing Decisions

Verification of Relay Locations

Secure Information Sources

Pro

toty

pe

1

2

3

On the Challenges of Geographical Avoidance for Tor29

Page 30: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Deployment: Timing Measurements

• Prior work: Probe the entire circuit

• Circuit is not checked at this point

• Two major issues:

• Security: Reveals endpoint to adversary

• Performance: Requires additional measurements

3

RTT

1. D. Levin, Y. Lee, L. Valenta, Z. Li, V. Lai, C. Lumezanu, N. Spring, and B. Bhattacharjee,

“Alibi Routing,” in Conference of the ACM Special Interest Group on Data Communication, SIGCOMM‘15

2. Z. Li, S. Herwig, and D. Levin, “DeTor: Provably Avoiding Geographic Regions in Tor,”

in USENIX Security Symposium, USENIX‘17

Page 31: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Alternative: Handshake Timings 3

RTT

Handshake(Client,Entry)

Handshake(Client,Middle)

Handshake(Client,Exit)

On the Challenges of Geographical Avoidance for Tor31

Page 32: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Secure Information Sources• No additional measurements

• Delivers end-to-end timing of circuit

• Does not reveal connection endpoint

3

Handshake(Client,Entry)

Handshake(Client,Middle)

Handshake(Client,Exit)

On the Challenges of Geographical Avoidance for Tor32

Page 33: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Technical Concept

On the Challenges of Geographical Avoidance for Tor33

Network Side Client Side

Page 34: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Two Types of Measurements

On the Challenges of Geographical Avoidance for Tor34

Network Side Client Side

Distributed Measurements Circuit Evaluation Circuit Measurement

Page 35: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Decision Data

On the Challenges of Geographical Avoidance for Tor35

Network Side Client Side

Distributed Measurements Circuit Evaluation Circuit Measurement

Relay Verification (ICMP)

Empirical Estimates (TCP)Decision End-to-End Timing of Circuit

𝑹𝒆𝟐𝒆𝑹𝒆𝒔𝒕 𝑹𝒆𝟐𝒆 < 𝑹𝒆𝒔𝒕?

Page 36: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

ExperimentsGathering empirical data, comparing approaches.

Page 37: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Metrics: How to measure what we achieved1. Restrictive avoidance decisions harm the network.

2. Static thresholds are not realistic.

• We measure:

• What if…? Loss of bandwidth and circuits in

different scenarios.

• Time Ratio: Difference between the measured

and the estimated time.

On the Challenges of Geographical Avoidance for Tor39

Page 38: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

What if…?

Page 39: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

What if Germany was forbidden area?

Empirical Decision

Rejected Circuits: 71%

Rejected Bandwidth: 74%

Our Work

Page 40: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

What if Germany was forbidden area?

Empirical Decision

Rejected Circuits: 71%

Rejected Bandwidth: 74%

Static Decision

Rejected Circuits: 90%

Rejected Bandwidth: 86%

Our Work

Prior Work

Page 41: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Limit Performance Impairments

0

5

10

15

20

25

30

35

40

Germany Average

Remaining Resources

Empirical Static

22%

→216 MBit/s

bandwidth saved

Page 42: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

ConclusionLessons learned.

Page 43: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Challenges of Geographical Avoidance3 Classes of Challenges

1. Network Diversity

2. Ground Truth

3. Deployment

On the Challenges of Geographical Avoidance for Tor45

Page 44: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Designing an Avoidance SystemMain Features

1. Empirical Decisions

2. Verification of Locations

3. Secure Information

Sources

3 Classes of Challenges

1. Network Diversity

2. Ground Truth

3. Deployment

On the Challenges of Geographical Avoidance for Tor46

Page 45: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Prototype with TradeoffEvaluation

1. Time Ratio for Decision

Tradeoff

2. What-if Analysis

Main Features

1. Empirical Decisions

2. Verification of Locations

3. Secure Information

Sources

3 Classes of Challenges

1. Network Diversity

2. Ground Truth

3. Deployment

On the Challenges of Geographical Avoidance for Tor47

Germany Average

Empirical Static

Page 46: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Thank You! Questions?Evaluation

1. Time Ratio for Decision

Tradeoff

2. What-if Analysis

Main Features

1. Empirical Decisions

2. Verification of Locations

3. Secure Information

Sources

3 Classes of Challenges

1. Network Diversity

2. Ground Truth

3. Deployment

On the Challenges of Geographical Avoidance for Tor48

Germany Average

Empirical Static

Page 47: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

AppendixMore information

On the Challenges of Geographical Avoidance for Tor49

Page 48: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

1. Network Diversity: Connection Lengths

Entry

Middle

Exit

Server

Client

EU ↔ EU

4,384 km2,724 miles

Page 49: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

1. Network Diversity: Connection Lengths

Entry

Middle

ExitServer

Client

NA ↔ NA

19,210 km11,937 miles

Page 50: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

1. Network Diversity: Connection Failures

~11% of circuits failed12,500 out of 105,889

Page 51: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Verification of Relay Locations• Measuring relay positions

• Send ICMP probes to relays

• Use multiple reference points

• Estimate position using trilateration

Remote Server

Relay

Problem:

Which position is more precise?

2

On the Challenges of Geographical Avoidance for Tor53

Page 52: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Physical Proof• Measuring relay positions

• Send ICMP probes to relays

• Use multiple reference points

• Estimate position using trilateration

Speed of light proof

1. Measure RTT from server to relay

2. Compute upper bound threshold with c

1. Measured Speed ≤ Speed of light?

2. Measured Speed > Speed of light?

3. Violation: Update GeoIP location with estimate

False GeoIP Location

Estimated Location

S. Capkun and J. P. Hubaux, “Secure Positioning of Wireless Devices with Application to Sensor Networks,”

in Annual Joint Conference of the IEEE Computer and Communications Societies

2

Page 53: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Comparison of Approaches

0.00

0.25

0.50

0.75

1.00

0 1 2 3Time Ratio

CD

F

Stat. Symm. Stat. Asymm. Empirical Prototype

On the Challenges of Geographical Avoidance for Tor55

Page 54: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Prototype Simulation

0.00

0.25

0.50

0.75

1.00

Time Ratio

CD

F

0 1 2 3

On the Challenges of Geographical Avoidance for Tor56

Page 55: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Time Ratio

0.00

0.25

0.50

0.75

1.00

Time Ratio

CD

F

0 1 2 3

𝑅𝑒𝑠𝑡𝑅𝑒2𝑒

𝑅𝑒𝑠𝑡 = 𝑅𝑒2𝑒

On the Challenges of Geographical Avoidance for Tor57

Page 56: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Decision Threshold

0.00

0.25

0.50

0.75

1.00

Time Ratio

CD

F

0 1 2 3

𝑅𝑒𝑠𝑡𝑅𝑒2𝑒

𝑅𝑒𝑠𝑡 = 𝑅𝑒2𝑒

Reject Accept

On the Challenges of Geographical Avoidance for Tor58

Page 57: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Handshake Overhead

0.0

0.1

0.2

0.3

0.4

0 25,000 50,000 75,000Distance [km]

Spee

d [c]

Estimate Handshake

0.31𝑐

On the Challenges of Geographical Avoidance for Tor59

Page 58: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Measurement StatisticsStability of Results

On the Challenges of Geographical Avoidance for Tor60

Type Iteration Mean Median SD Duration #Results

TCP

1 287 288 158 5 days 223,070

2 359 335 180 7 days 134,370

3 327 295 185 8 days 275,509

ICMP

1 99 67 98 1 day 27,274

2 56 18 77 1 day 62,643

3 136 128 102 2 days 1,837,761

Measurement Overhead

• Approx. 2.8 Mio. daily Tor users, 121.5 Gbit/s average consumed bandwidth

• TrilateraTor consumes 6.24 ∗ 10−7% of daily bandwidth and 4 ∗ 10−4% of circuits

Page 59: On the Challenges of Geographical Avoidance for Tor › wp-content › uploads › ... · im Menü über: Start > Absatz > Listenebene Traffic Analysis Attacks Metadata leaks information

im Menü über:

Start > Absatz >

Listenebene

Experimental Setup• 8 Server instances

• Hop Estimates 𝑹𝒆𝟐𝒆 : 16,500 relay combinations

• 1,945 Entries, 3,724 Middles, 893 Exits

• Circuit RTT 𝑹𝒆𝒔𝒕 : 70,081 circuits, 275,509 measurements

• 1,670 Entries, 2,712 Middles, 735 Exits (artificial circuits)

• 135,924 reference circuits

On the Challenges of Geographical Avoidance for Tor61