surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • dec 2016:...

24

Upload: others

Post on 24-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email
Page 2: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

cs642

surveillance & anonymity

adam everspaugh [email protected]

computer security

Page 3: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

todayInternet-wide scanning, zmap

Massive surveillance, packet inspection

Anonymous browsing, TOR

Page 4: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

TCPhandshake

SYNseqC,0

SYN/ACKseqS,seqC+1

ACKseqC+1,seqS+1

SYN=synflagsetACK=ackflagsetx,y=xissequence#,yisacknowledge#

Client Server

TCPconnectionestablished

Page 5: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

mass scanningWhat if we want to scan the "whole internet"?

Why? / Find all the unsecured webcams [shodani.io] / Find all the broken webservers

How would we do this? / nmap -p 443 0.0.0.0/32 / IPv4: 32-bits - 14% IANA reserved addresses

How long would this take? / Assume mean round-trip time = 100ms

think-pair-share

Page 6: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

zmap

[zmap, Durumeric et al.]

ZMap paper: 1300x faster than nmap How?

Page 7: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

fast scanning

Client

SYN

SYN

SYN

SYNSYN

SYN

SYN

SYNSYN/ACK

SYN/ACK

SYN/ACK

SYN/ACKRecord responsesRSTRSTRST

Page 8: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

zmapa0

a2

a3a4a5

a6

a7

a8

a9 a1

1.1.1.11.1.1.2

1.1.1.3

Can't scan at high-speed in-order Why?

ZMap uses a permutation over the address space

Random ordering, but

don't have to track list of scanned addresses

Page 9: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

dual ecInvestigating "rigged" random number generator (RNG) called "dual elliptic curve" (dual EC) RNG

… that could be used in setting up TLS connections

Q: How many web servers support this RNG in real life?

Scanned IPv4 with ZMap / 39M servers responding on port 443 / Took 48 hours from CSL@UW

Probed each web server with instrumented OpenSSL client (recorded TLS handshake) / 22M TLS (half-)handshakes; took 4 weeks

[On the Practical Exploitability of Dual-EC, Checkoway et al.]

Page 10: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

AT&TWiretapcase

• MarkKleindisclosespotentialwiretappingactivitiesbyNSAatSanFranciscoAT&Toffice

• FiberopticsplitteronmajortrunklineforInternetcommunications– Electronicvoiceanddatacommunicationscopiedto“secretroom”

– NarusSTA6400device

Page 11: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Interceptiontechnology

• FromNaruswebsite [http://narus.com/index.php/product/narusinsight-intercept]– “Targetbyphonenumber,URI,emailaccount,username,keyword,protocol,applicationandmore”,“Service-andnetworkagnostic”,“IPV6ready”

– Collectsatwirespeedsbeyond10Gbps

Page 12: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Othermajorbackbone

Othermajorbackbone

AT&Tnetwork

Wiretapsurveillance

Interceptiongear

MAE-West(MetropolitanAreaExchange,West)

LargeamountsofInternettrafficcrossrelativelyfewkeypoints

Page 13: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Typesofpacketinspection

userdataApplheaderTCPheaderIPheaderIPdatagram

Deeppacketinspection(DPI)analyzesapplicationheadersanddata

InternetserviceprovidersneedonlylookatIPheaderstoperformrouting Shallowpacketinspection

investigateslowerlevelheaderssuchasTCP/UDP

Whichinspectionismostpowerful?Whatarethetechnologychallenges?

Page 14: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Internet

IntrusionDetectionSystems(IDS)

Outerfirewall

Innerfirewall

Webserver

IDSCustomerdatabases

WhatcananIDSdothataroutercannot?StoreinformationforforensicsMatchknownattackpatterns(malware,XSS,SQLinjection)

Page 15: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Preventingintercept

• End-to-endencryption(TLS,SSH)

• Whatdoesthisprotect?Whatdoesitleak?

• Whatcangowrong?

Othermajorbackbone

AT&Tnetwork

Interceptiongear

IP:1.2.3.4

IP:5.6.7.8

think-pair-share

Page 16: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

End-runaroundHTTPS

• HTTPSterminatedatedgeofGooglenetworks

• Internaldatacenter-to-datacentercommunicationsonprivatelyleasedlines

Page 17: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Hidingconnectivityisharder

• IPaddressesarerequiredtoroutecommunication,yetnotencryptedbynormalend-to-endencryption– 1.2.3.4talkedto5.6.7.8overHTTPs

• Howcanwehideconnectivityinformation?

Page 18: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Tor(TheOnionRouter)

Othermajorbackbone

AT&Tnetwork

Interceptiongear

IP:1.2.3.4

IP:5.6.7.8

Othermajorbackbone

TorNodeTorNode TorNode

7.8.9.1 8.9.1.19.1.1.2

Client->7.8.9.1->8.9.1.1->9.1.1.2->DestinationCalledacircuit

Page 19: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

HTTPpacketSrc:

9.1.1.2Dest:5.6.7.8

IP:1.2.3.4

IP:5.6.7.8

Encryptedto9.1.1.2Src:

8.9.1.1Dest:9.1.1.2

9.1.1.28.9.1.1

Encryptedto8.9.1.1Src:

8.9.1.1Dest:9.1.1.2

7.8.9.1

Encryptedto7.8.9.1Src:

7.8.9.1Dest:8.9.1.1

Onionrouting:thebasicidea

Torimplementsmorecomplexversionofthisbasicidea

Page 20: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Whatdoesadversarysee?

Othermajorbackbone

AT&Tnetwork

Interceptiongear

IP:1.2.3.4

IP:5.6.7.8

Othermajorbackbone

TorNodeTorNode TorNode

7.8.9.1 8.9.1.19.1.1.2

HTTPpacketSrc:

9.1.1.2Dest:5.6.7.8

Torobfuscateswhotalkedtowhom,needend-to-endencryption(e.g.,HTTPS)toprotectpayload

Page 21: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

• Dec2016:EldoKim,Harvardsophomore,sentbombthreatsusingGuerillaMail(anonymousemailservice)

• UsedToRtoconnecttoGuerillaMail(fromhisdormroom)

• Caughtwithin2days

• Howdidhegetcaught?

• GuerillaMailindicateduserconnectedviaToRnode

• FBIcomparedtimestamponemailtoHarvardnetworklogs,

• HewastheonlyoneusingToRatthattime,confessedwhenconfronted

Page 22: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

[Asof:April13,2016]

Page 23: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

Otheranonymizationsystems

• Single-hopproxyservices

• JonDonym,anonymousremailers(MixMaster,MixMinion),manymore…

Anonymizer.com

Page 24: surveillance & anonymitypages.cs.wisc.edu/~ace/media/lectures/surveillance.pdf · • Dec 2016: Eldo Kim, Harvard sophomore, sent bomb threats using Guerilla Mail (anonymous email

recapInternet-wide scanning, zmap

Massive surveillance, packet inspection

Anonymous browsing, TOR