we built this circuit
TRANSCRIPT
![Page 1: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/1.jpg)
WE BUILT THIS CIRCUIT:
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR6th IEEE European Symposium on Security and Privacy (Euro S&P ´21), September 9, 2021
Theodor Schnitzler Christina Pöpper Markus Dürmuth Katharina Kohls
Ruhr-Universität Bochum New York University Abu Dhabi Ruhr-Universität Bochum Radboud University
![Page 2: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/2.jpg)
2
ANONYMITY IN TOR
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
www.internet.com
68.183.182.75
![Page 3: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/3.jpg)
3
TRAFFIC ANALYSIS
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
inbound traffic outbound traffic
[1] Nasr et al.: DeepCorr: Strong Flow Correlation Attacks on Tor Using Deep Learning (ACM CCS 2018)
![Page 4: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/4.jpg)
4
REQUIREMENTS FOR TRAFFIC ANALYSIS
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
Monitoring Effort
Capture and evaluate
large amounts of Tor traffic
Access to Traffic
capture traffic of 7,000 relays
in different geographical locations
600 Gbit/s advertised bandwidth
300 Gbit/s consumed bandwidth
![Page 5: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/5.jpg)
5
REQUIREMENTS FOR TRAFFIC ANALYSIS
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
Can an adversary
determine if they have
access to Tor exit traffic?
Research Questions
Assumptions
Adversary has access to
exit traffic of a set of relays
Adversary has access
to client‘s entry traffic
Targeted scenario
![Page 6: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/6.jpg)
6
EXIT PREDICTION
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
Goal: Exit Candidate Ranking
Determine success of traffic analysis
from positions of relays that can be accessed
Relay Selection
More bandwidth Higher probability
Few restrictions to avoid collusions
Limited Utility
Same result for each prediction
No specific information
for particular circuits
1. ConnecTor p = 0.0185
2. PredaTor p = 0.0141
3. MoniTor p = 0.0110
4. BenefacTor p = 0.0102
5. EigenTor p = 0.0094
6. LiberaTor p = 0.0092
![Page 7: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/7.jpg)
7
EvaluationExperiment
257k handshake timings
Transmission models
for groups of relays
(per country)
Find most likely model
for new observations
Probability for each
exit candidate ranking
EXIT PREDICTION FOR INDIVIDUAL CIRCUITS
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
nTor Handshake Timings
Δt(m,x) = t(hs3) - t(hs2)
hs3
hs2
hs1
Adversary with access
to all relays in a country
Median exit rank [%]
in prediction
Ranking DE US FR GB NL
COMBI 4 12 7 9 8
TIME 10 25 13 15 17
BW 11 21 16 23 22
RAND 49 50 50 51 50
MEASUREMENTS CONDUCTED AT OUR CLIENTS, TO NOT RECORD
TRAFFIC OF OTHER USERS
RESEARCH ETHICS
![Page 8: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/8.jpg)
8
IN THE PAPER
Further Evaluation
Success rates monitoring effort
Actively Interfering with Circuit Establishment
Force client to switch to another guard
Trigger DoS Mitigation
Benefits: Stealthy Attack
Mitigation Options Affect Performance
Delays for Timing Obfuscation
Randomized Relay Selection
EXPLORING THREAT VECTORS IN CIRCUIT ESTABLISHMENT IN TOR
IEEE Euro S&P 2021 – Online Event
Theodor Schnitzler, Christina Pöpper, Markus Dürmuth, Katharina Kohls
![Page 9: We Built This Circuit](https://reader035.vdocuments.site/reader035/viewer/2022081503/62a2a488ca94a9245c4bdb5e/html5/thumbnails/9.jpg)
WE BUILT THIS CIRCUIT:
EXPLORING THREAT VECTORS
IN CIRCUIT ESTABLISHMENT IN TOR6th IEEE European Symposium on Security and Privacy
Euro S&P ´21, September 9, 2021
Theodor Schnitzler
Ruhr-Universität Bochum
@the0retisch
Key Takeaways
Access to traffic is a critical
requirement for traffic analysis
Information leak in Tor circuit
establishment can improve the
position of the adversary
Attacks using defensive features
are hard to mitigate
Illustrations: Katharina Kohls