how tor works?

35
The Onion Router How Works? BMS College of Engineering, Bangalore By :- ONKAR BADIGER

Upload: onkar-badiger

Post on 09-Jan-2017

144 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: How TOR works?

The Onion Router

How Works?

BMS College of Engineering, Bangalore

By :- ONKAR BADIGER

Page 2: How TOR works?

Overview How TOR works?

• Why use TOR?• Places of attack• Anonymity network(TOR design)• Chain of relays• Encryption • Bridges • Extensions

• https everywhere• Tor button• Noscript

Page 3: How TOR works?

Why use TOR?• Compromised ISP• Monitoring ISP• Monitored website• Monitored network• Filtered website(blocked)

Page 4: How TOR works?

ISP Destination(website)

This is how we connect to internet

Page 5: How TOR works?

ISPDestination(website)

Anonymity network

Anonymity network must be between ISP and our destination

Page 6: How TOR works?

ISPDestination(website)

Anonymity network

Places of attack

Compromised ISP(untrusted ISP)Monitored ISP

Page 7: How TOR works?

ISPDestination(website)

Anonymity network

Places of attack

Control parts of anonymity network may attack

Page 8: How TOR works?

ISPDestination(website)

Anonymity network

Places of attack

Website is monitoring to advertise, collect data

etc.

Page 9: How TOR works?

Anonymity network Proxy? VPN?

RELAY

Page 10: How TOR works?

Anonymity network Proxy? VPN?

RELAY

TRUST?

ATTACKER

ATTACKER

Page 11: How TOR works?

RELAY 1

RELAY 2

RELAY 3

ISP

TOR network

Page 12: How TOR works?

Can we trust relays?

Page 13: How TOR works?

RELAY 1

RELAY 2

RELAY 3

ISP

TOR network

What if entry/guard relay is corrupt?

Page 14: How TOR works?

RELAY 1

RELAY 2

RELAY 3

ISP

TOR network

What if exit relay is corrupt?

Page 15: How TOR works?

RELAY 1

RELAY 2

RELAY 3

ISP

TOR network

What if both entry & exit relay are corrupt?

Page 16: How TOR works?

Solution?

RELAY 1

RELAY 5

RELAY 2

RELAY 4

RELAY 3

ISP

TOR network

RELAY 7

RELAY 6 RELAY 8

Page 17: How TOR works?

RELAY 1

RELAY 5

RELAY 2

RELAY 4

RELAY 3

ISP

TOR networkKEY

KEY

KEY

Solution? ENCRYPTION

Page 18: How TOR works?

RELAY 1

RELAY 5

RELAY 2

RELAY 4

RELAY 3

ISP

TOR networkKEY

KEY

KEY

unencrypted

Page 19: How TOR works?

https everywhere

RELAY 1

RELAY 5

RELAY 2

RELAY 4

RELAY 3

ISP

TOR networkKEY

KEY

KEY unencrypte

d

Page 20: How TOR works?

How TOR manages relaying?

Page 21: How TOR works?

Tor button

Page 22: How TOR works?

Tor button

Page 23: How TOR works?

New tor circuit

Page 24: How TOR works?

Tor button is not all about relaying!

Page 25: How TOR works?

Tor button Not just relaying!

Security

Page 26: How TOR works?

Tor button Not just relaying!

Security

Page 27: How TOR works?

Bridges ?

• Entry relays

• Not listed in main TOR directory

Page 28: How TOR works?

Why use Bridges ?• ISP blocks TOR• You don’t want ISP to know that you are using TOR

Page 29: How TOR works?

Types of Bridges ?

Preconfigured bridge

Custom bridge

Page 30: How TOR works?

Tor button Not just relaying!

Network settings

Page 31: How TOR works?

Tor button Not just relaying!

Network settings

https://bridges.torproject.org/[email protected]

Page 32: How TOR works?

No script

Blocks JavaScriptBlocks javaBlacks flashBlocks other pluginsProtects against clickjacking

Page 33: How TOR works?

How TOR works?

• Why use TOR?• Places of attack• Anonymity network(TOR design)• Chain of relays• Encryption • Bridges • Extensions

• https everywhere• Tor button• Noscript

Page 34: How TOR works?

Check these out…• How to setup tor relay?• How to setup non exit tor relay?• ORBOT (TOR for android)• TAILS (live OS routed through TOR)• Pluggable transports(fakes innocent traffic)• Unblock TOR in college!

Page 35: How TOR works?

The Onion Router

Source : https://www.torproject.org/docs/documentation.html.en

ONKAR BADIGER