| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353 | \documentclass{llncs}\usepackage{url}\usepackage{amsmath}\usepackage{epsfig}\setlength{\textwidth}{5.9in}\setlength{\textheight}{8.4in}\setlength{\topmargin}{.5cm}\setlength{\oddsidemargin}{1cm}\setlength{\evensidemargin}{1cm}\newenvironment{tightlist}{\begin{list}{$\bullet$}{  \setlength{\itemsep}{0mm}    \setlength{\parsep}{0mm}    %  \setlength{\labelsep}{0mm}    %  \setlength{\labelwidth}{0mm}    %  \setlength{\topsep}{0mm}    }}{\end{list}}\newcommand{\workingnote}[1]{}        % The version that hides the note.%\newcommand{\workingnote}[1]{(**#1)}   % The version that makes the note visible.\begin{document}\title{Design challenges and social factors in deploying low-latency anonymity}% Could still use a better title -PFS\author{Roger Dingledine\inst{1} \andNick Mathewson\inst{1} \andPaul Syverson\inst{2}}\institute{The Tor Project \email{<\{arma,nickm\}@torproject.org>} \andNaval Research Laboratory \email{<syverson@itd.nrl.navy.mil>}}\maketitle\pagestyle{plain}\begin{abstract}  There are many unexpected or unexpectedly difficult obstacles to  deploying anonymous communications.  We describe Tor (\emph{the}  onion routing), how to use it, our design philosophy, and some of  the challenges that we have faced and continue to face in building,  deploying, and sustaining a scalable, distributed, low-latency  anonymity network.\end{abstract}\section{Introduction}This article describes Tor, a widely-used low-latency general-purposeanonymous communication system, and discusses some unexpectedchallenges arising from our experiences deploying Tor.  We will tellyou how to use it, who uses it, how it works, why we designed it theway we did, and why this makes it usable and stable.Tor is an overlay network for anonymizing TCP streams over theInternet~\cite{tor-design}.  Tor works on the real-world Internet,requires no special privileges or kernel modifications, requireslittle synchronization or coordination between nodes, and provides areasonable trade-off between anonymity, usability, and efficiency.Since deployment in October 2003 the public Tor network has grown toabout a thousand volunteer-operated nodes worldwide and over 110megabytes average traffic per second from hundreds of thousands ofconcurrent users. \section{Tor Design and Design Philosophy: Distributed Trust and Usability}Tor enables users to connect to Internet sites without revealing theirlogical or physical locations to those sites or to observers.  Itenables hosts to be publicly accessible yet have similar protectionagainst location through its \emph{location-hidden services}.To connect to a remote server via Tor the client software first learnsa %signedlist of Tor nodes from several central \emph{directory servers} via avoting protocol (to avoid dependence on or complete trust in any oneof these servers). It then incrementally creates a private pathway or\emph{circuit} across the network. This circuit consists ofencrypted connections through authenticated Tor nodeswhose public keys were obtained from the directory servers. The clientsoftware negotiates a separate set of encryption keys for each hop along thecircuit. The nodes in the circuit are chosen at random by the clientsubject to a preference for higher performing nodes to allocateresources effectively and with a client-chosen preferred set of firstnodes called \emph{entry guards} to complicate profiling attacks byinternal adversaries~\cite{hs-attack}.The circuit is extended one node at a time, tunneling extensionsthrough already established portions of the circuit, and each nodealong the way knows only the immediately previous and following nodesin the circuit, so no individual Tor node knows the complete path thateach fixed-sized data packet (or \emph{cell}) will take.  Thus,neither an eavesdropper nor a compromised node can see both theconnection's source and destination.  Later requests use a newcircuit to complicate long-term linkability between different actionsby a single user.Tor attempts to anonymize the transport layer, not the applicationlayer.  Thus, applications such as SSH can provideauthenticated communication that is hidden by Tor from outside observers.When anonymity from communication partners is desired,application-level protocols that transmit identifyinginformation need additional scrubbing proxies, such asPrivoxy~\cite{privoxy} for HTTP\@.  Furthermore, Tor does not relayarbitrary IP packets; it only anonymizes TCP streams and DNS requests.Tor, the third generation of deployed onion-routingdesigns~\cite{or-ih96,or-jsac98,tor-design}, was researched, developed,and deployed by the Naval Research Laboratory and the Free HavenProject under ONR and DARPA funding for secure governmentcommunications.  In 2005, continuing work by Free Haven was funded bythe Electronic Frontier Foundation for maintaining civil liberties ofordinary citizens online. In 2006, The Tor Project incorporated as anon-profit and has received continued funding from the Omidyar Network,the U.S. International Broadcasting Bureau, and other groups to combatblocking and censorship on the Internet. This diversity of funding fitsTor's overall philosophy: a wide variety of interests helps maintainboth the stability and the security of the network.Usability is also a central goal. Downloading and installing Tor iseasy. Simply go to\\http://torproject.org/ and download.  Tor comes with installwizards and a GUI for major operating systems: GNU/Linux, OS X, andWindows. It also runs on various flavors of BSD and UNIX\@. Basicinstructions, documentation, FAQs, etc.\ are available in manylanguages. The Tor GUI Vidalia makes server configuration easy, e.g.,choosing how much bandwidth to allocate to Tor, exit policy choices,etc. And, the GUI Torbutton allows Firefox users a one-click toggle ofwhether browsing goes through Tor or not.  Tor is easily configured bya site administrator to run at either individual desktops or just at asite firewall or combinations of these.The ideal Tor network would be practical, useful and anonymous. Whentrade-offs arise between these properties, Tor's research strategy hasbeen to remain useful enough to attract many users, and practicalenough to support them.  Only subject to these constraints do we tryto maximize anonymity.  Tor thus differs from other deployed systemsfor traffic analysis resistance in its security and flexibility.  Mixnetworks such as% Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design} gain the highest degrees of practicalanonymity at the expense of introducing highly variable delays, makingthem unsuitable for applications such as web browsing.  Commercialsingle-hop proxies~\cite{anonymizer} can provide good performance, buta single-point compromise can expose all users' traffic, and asingle-point eavesdropper can perform traffic analysis on the entirenetwork.  Also, their proprietary implementations place anyinfrastructure that depends on these single-hop solutions at the mercyof their providers' financial health as well as network security.There are numerous other designs for distributed anonymous low-latencycommunication~\cite{crowds-tissec,web-mix,freedom21-security,i2p,tarzan:ccs02,morphmix:fc04}.Some have been deployed or even commercialized; some exist only onpaper. Though each has something unique to offer, we feel Tor hasadvantages over each of them that make it a superior choice for mostusers and applications. For example, unlike purely P2P designs weneither limit ordinary users to content and services available onlywithin our network nor require them to take on responsibility forconnections outside the network, unless they separately choose to runserver nodes. Nonetheless because we support low-latency interactivecommunications, end-to-end \emph{traffic correlation}attacks~\cite{danezis:pet2004,defensive-dropping,SS03,hs-attack,bauer:tr2007}allow an attacker who can observe both ends of a communication tocorrelate packet timing and volume, quickly linking the initiator toher destination.Our defense lies in having a diverse enough set of nodes to preventmost real-world adversaries from being in the right places to attackusers, by distributing each transaction over several nodes in thenetwork.  This ``distributed trust'' approach means the Tor networkcan be safely operated and used by a wide variety of mutuallydistrustful users, providing sustainability and security.The Tor network has a broad range of users, making it difficult foreavesdroppers to track them or profile interests. These includeordinary citizens concerned about their privacy, corporations whodon't want to reveal information to their competitors, and lawenforcement and government intelligence agencies who need to dooperations on the Internet without being noticed.  Naturally,organizations will not want to depend on others for their security.If most participating providers are reliable, Tor tolerates somehostile infiltration of the network.This distribution of trust is central to the Tor philosophy andpervades Tor at all levels: Onion routing has been open source sincethe mid-nineties (mistrusting users can inspect the code themselves);Tor is free software (anyone could take up the development of Tor fromthe current team); anyone can use Tor without license or charge (whichencourages a broad user base with diverse interests); Tor is designed to beusable (also promotes a large, diverse user base) and configurable (sousers can easily set up and run server nodes); the Torinfrastructure is run by volunteers (it is not dependent on theeconomic viability or business strategy of any company) who arescattered around the globe (not completely under the jurisdiction ofany single country); ongoing development and deployment has beenfunded by diverse sources (development does not fully depend onfunding from any one source or even funding for any one primarypurpose or sources in any one jurisdiction). All of these contributeto Tor's resilience and sustainability.\section{Social challenges}Many of the issues the Tor project needs to address extend beyondsystem design and technology development. In particular, the Torproject's \emph{image} with respect to its users and the rest of theInternet impacts the security it can provide.  With this image issuein mind, this section discusses the Tor user base and Tor'sinteraction with other services on the Internet.\subsection{Communicating security}Usability for anonymity systems contributes to their security, becauseusability affects the possible anonymity set~\cite{econymics,back01}.Conversely, an unusable system attracts few users and thus can'tprovide much anonymity.This phenomenon has a second-order effect: knowing this, users shouldchoose which anonymity system to use based in part on how usable andsecure \emph{others} will find it, in order to get the protection of alarger anonymity set. Thus we might supplement the adage ``usabilityis a security parameter''~\cite{back01} with a new one: ``perceivedusability is a security parameter.''~\cite{usability-network-effect}.\subsection{Reputability and perceived social value}Another factor impacting the network's security is its reputability,the perception of its social value based on its current user base. IfAlice is the only user who has ever downloaded the software, it mightbe socially accepted, but she's not getting much anonymity. Add athousand activists, and she's anonymous, but everyone thinks she's anactivist too.  Add a thousand diverse citizens (cancer survivors,people concerned about identity theft, law enforcement agents, and soon) and now she's harder to profile.Furthermore, the network's reputability affects its operator base:more people are willing to run a service if they believe it will beused by human rights workers than if they believe it will be usedexclusively for disreputable ends.  This effect becomes stronger ifnode operators themselves think they will be associated with theirusers' ends.So the more cancer survivors on Tor, the better for the human rightsactivists. The more malicious hackers, the worse for the normalusers. Thus, reputability is an anonymity issue for tworeasons. First, it impacts the sustainability of the network: anetwork that's always about to be shut down has difficulty attractingand keeping adequate nodes.  Second, a disreputable network is morevulnerable to legal and political attacks, since it will attract fewersupporters.Reputability becomes even more tricky in the case of privacy networks,since the good uses of the network (such as publishing by journalistsin dangerous countries, protecting road warriors from profiling andpotential physical harm, tracking of criminals by law enforcement,protecting corporate research interests, etc.) are typically kept private,whereas network abuses or other problems tend to be more widelypublicized.\subsection{Abuse}\label{subsec:tor-and-blacklists}For someone willing to be antisocial or even break the law, Tor isusually a poor choice to hide bad behavior. For example, Tor nodes arepublicly identified, unlike the million-node botnets that are nowcommon on the Internet. Nonetheless, we always expected that,alongside legitimate users, Tor would also attract troublemakers whoexploit Tor to abuse services on the Internet with vandalism, rudemail, and so on.  \emph{Exit policies} have allowed individual nodesto block access to specific IP/port ranges.  This approach aims tomake operators more willing to run Tor by allowing them to preventtheir nodes from being used for abusing particular services.  Forexample, by default Tor nodes block SMTP (port 25), to avoid the issueof spam.Exit policies are useful but insufficient: if not all nodes block agiven service, that service may try to block Tor instead.  While beingblockable is important to being good netizens, we would like toencourage services to allow anonymous access. Services should not needto decide between blocking legitimate anonymous use and allowingunlimited abuse.  Nonetheless, blocking IP addresses is acourse-grained solution~\cite{netauth}: entire apartment buildings,campuses, and even countries sometimes share a single IP address.Also, whether intended or not, such blocking supports repression offree speech. In many locations where Internet access of various kindsis censored or even punished by imprisonment, Tor is a path both tothe outside world and to others inside.  Blocking posts from Tor makesthe job of censoring authorities easier.  This is a loss for both Torand services that block, such as Wikipedia: we don't want to competefor (or divvy up) the NAT-protected entities of the world.  This isalso unfortunate because there are relatively simple technicalsolutions~\cite{nym}.  Various schemes for escrowing anonymous postsuntil they are reviewed by editors would both prevent abuse and removeincentives for attempts to abuse. Further, pseudonymous reputationtracking of posters through Tor would allow those who establishadequate reputation to post without escrow~\cite{nym,nymble}.We stress that as far as we can tell, most Tor uses are notabusive. Most services have not complained, and others are activelyworking to find ways besides banning to cope with the abuse. Forexample, the Freenode IRC network had a problem with a coordinatedgroup of abusers joining channels and subtly taking over theconversation; but when they labelled all users coming from Tor IPaddresses as ``anonymous users,'' removing the ability of the abusersto blend in, the abusers stopped using Tor.  This is an illustration ofhow simpletechnical mechanisms can remove the ability to abuse anonymouslywithout undermining the ability to communicate anonymously and canthus remove the incentive to attempt abusing in this way.\section{The Future}\label{sec:conclusion}Tor is the largest and most diverse low-latency anonymity networkavailable, but we are still in the early stages. Several majorquestions remain.First, will our volunteer-based approach to sustainability continue towork as well in the long term as it has the first several years?Besides node operation, Tor research, deployment, maintainance, anddevelopment is increasingly done by volunteers: package maintenancefor various OSes, document translation, GUI design and implementation,live CDs, specification of new design changes, etc.\%Second, Tor is only one of many components that preserve privacyonline.  For applications where it is desirable to keep identifyinginformation out of application traffic, someone must build more andbetter protocol-aware proxies that are usable by ordinary people.%Third, we need to maintain a reputation for social good, and learn how tocoexist with the variety of Internet services and their establishedauthentication mechanisms. We can't just keep escalating the blackliststandoff forever.%Fourth, the current Tor architecture hardly scales even to handlecurrent user demand. We must deploy designs and incentives to furtherencourage clients to relay traffic too, without thereby trading awaytoo much anonymity or other properties.These are difficult and open questions. Yet choosing not to solve themmeans leaving most users to a less secure network or no anonymizingnetwork at all.\\\noindent{\bf Acknowledgment:} Thanks to Matt Edman for many  helpful comments on a draft of this article.\bibliographystyle{plain} \bibliography{tor-design}\end{document}
 |