| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294 | \documentclass{llncs}\usepackage{url}\usepackage{amsmath}\usepackage{epsfig}%\setlength{\textwidth}{5.9in}%\setlength{\textheight}{8.4in}%\setlength{\topmargin}{.5cm}%\setlength{\oddsidemargin}{1cm}%\setlength{\evensidemargin}{1cm}\newenvironment{tightlist}{\begin{list}{$\bullet$}{  \setlength{\itemsep}{0mm}    \setlength{\parsep}{0mm}    %  \setlength{\labelsep}{0mm}    %  \setlength{\labelwidth}{0mm}    %  \setlength{\topsep}{0mm}    }}{\end{list}}\begin{document}\title{Design of a blocking-resistant anonymity system}\author{}\maketitle\pagestyle{plain}\begin{abstract}...\end{abstract}\section{Introduction and Goals}Websites like Wikipedia and Blogspot are increasingly being blocked bygovernment-level firewalls around the world.China is the third largest user base for Tor clients~\cite{geoip-tor}.Many people already want it, and the current Tor design is easy to block(by blocking the directory authorities, by blocking all the serverIP addresses, or by filtering the signature of the Tor TLS handshake).Now that we've got an overlay network, we're most of the way there interms of building a blocking-resistant tool.And it improves the anonymity that Tor can provide to add more differentclasses of users and goals to the Tor network.\subsection{A single system that works for multiple blocked domains}We want this to work for people in China, people in Iran, people inThailand, people in firewalled corporate networks, etc. The blockingcensor will be at different stages of the arms race in different places;and likely the list of blocked addresses will be different in eachlocation too.\section{Adversary assumptions}\label{sec:adversary}Three main network attacks currently:\begin{tightlist}\item Block destination by string matches in TCP packets.\item Block destination by IP address.\item Intercept DNS requests.\end{tightlist}Assume the network firewall has very limited CPU [clayton06] %~\cite{clayton06}.Assume that readers of blocked content will not be punished much(relative to writers).\section{Related schemes}\subsection{public single-hop proxies}\subsection{personal single-hop proxies}Easier to deploy; might not require client-side software.\subsection{break your sensitive strings into multiple tcp packets}\subsection{steganography}% \subsection{}\section{Useful building blocks}\subsection{Tor}Tor provides three security properties:\begin{tightlist}\item A local observer can't learn, or influence, your destination.\item The destination, or somebody watching the destination, can't learnyour location.\item No single piece of the infrastructure can link you to yourdestination.\end{tightlist}We care most clearly about property number 1. But when the arms raceprogresses, property 2 will become important -- so the blocking adversarycan't learn user+destination just by volunteering a relay. It's not soclear to see that property 3 is important, but consider websites andservices that are pressured into treating clients from certain networklocations differently.Other benefits:\begin{tightlist}\item Separates the role of relay from the role of exit node.\item (Re)builds circuits automatically in the background, based onwhichever paths work.\end{tightlist}\subsection{Tor circuits}can build arbitrary overlay paths given a set of descriptors [blossom] %~\cite{blossom}\subsection{Tor directory servers}\subsection{Tor user base}\section{The Design}\subsection{Bridge relays}Some Tor users on the free side of the network will opt to become bridgerelays. They will relay a bit of traffic and don't allow exits. Theysign up on the bridge directory authorities, below....need to outline instructions for a Tor config that will publishto an alternate directory authority, and for controller commandsthat will do this cleanly.\subsection{The bridge directory authority (BDA)}They aggregate server descriptors just like the main authorities, andanswer all queries as usual, except they don't publish network statuses.So once you know a bridge relay's key, you can get the most recentserver descriptor for it.XXX need to figure out how to fetch some statuses from the BDA withoutfetching all statuses. A new URL to fetch I presume?\subsection{Blocked users}If a blocked user knows about a working bridge relay, then he can makesecure connections to the BDA to update his knowledge about bridgerelays, and he can make secure connections to the main Tor networkand directory servers to build circuits and connect to the rest ofthe Internet.So now we've reduced the problem from how to circumvent the firewallfor all transactions (and how to know that the pages you get are thereal ones) to how to learn about a working bridge relay. They canbe distributed in three ways:\begin{tightlist}\item IP:dirport, so the user can connect directly to the bridgerelay, learn the associatedserver descriptor, and start building circuits. This is great, but what ifthe firewall creates signatures for plaintext http requests for serverdescriptors, to block them? One option is a workaround that changes theappearance of the plaintext at each step (I can imagine a simple schemewhere we send a 16 byte key, and then encrypt the rest of the stream withthat key -- it doesn't provide actual confidentiality, but it's hard torecognize that it's a Tor connection); another option is to conclude thatit will be better to tunnel through a Tor circuit when fetching them.\item Key fingerprint, which lets you lookup the most recent serverdescriptor at the BDA (assuming you can reach it).\item A blinded token, which can be exchanged at the BDA (assuming youcan reach it) for a new IP:dirport or server descriptor.\end{tightlist}See the following section for ways to bootstrap knowledge of your firstbridge relay, and ways to maintain connectivity once you know a fewbridge relays.\section{Discovering and maintaining working bridge relays}\subsection{Initial network discovery}We make the assumption that the firewall is not perfect. People canget around it through the usual means, or they know a friend who can.If they can't get around it at all, then we can't help them -- theyshould go meet more people.Thus they can reach the BDA. From here we either assume a socialnetwork or other mechanism for learning IP:dirport or key fingerprintsas above, or we assume an account server that allows us to limit thenumber of new bridge relays an external attacker can discover.\subsection{The account server}Users can establish reputations, perhaps based on social networkconnectivity, perhaps based on not getting their bridge relays blocked,\section{Other issues}\subsection{How many bridge relays should you know about?}If they're ordinary Tor users on cable modem or DSL, many of them willdisappear periodically. How many bridge relays should a blockee knowabout before he's likely to have at least one up at any given point?The related question is: if the bridge relays change IP addressesperiodically, how often does the blockee need to "check in" in orderto keep from being cut out of the loop?\subsection{How do we know if a bridge relay has been blocked?}We need some mechanism for testing reachability from inside theblocked area. The easiest answer is for certain users insidethe area to sign up as testing relays, and then we can route throughthem and see if it works.First problem is that different network areas block different net masks,and it will likely be hard to know which users are in which areas. Soif a bridge relay isn't reachable, is that because of a network blocksomewhere, because of a problem at the bridge relay, or just a temporaryoutage?Second problem is that if we pick random users to test random relays, theadversary should sign up users on the inside, and enumerate the relayswe test. But it seems dangerous to just let people come forward anddeclare that things are blocked for them, since they could be trickingus. (This matters even moreso if our reputation system above relies onwhether things get blocked to punish or reward.)\subsection{Tunneling directory lookups through Tor}All you need to do is bootstrap, and then you can useyour Tor connection to maintain your Tor connection,including doing secure directory fetches.\subsection{Predictable SSL ports}We should encourage most servers to listen on port 443, which iswhere SSL normally listens.Is that all it will take, or should we set things up so some fractionof them pick random ports? I can see that both helping and hurting.\subsection{Predictable TLS handshakes}Right now Tor has some predictable strings in its TLS handshakes.These can be removed; but should they be replaced with nothing, orshould we try to emulate some popular browser? In any case ourprotocol demands a pair of certs on both sides -- how much will thismake Tor handshakes stand out?\section{Anonymity issues from becoming a bridge relay}You can actually harm your anonymity by relaying traffic in Tor.  This isthe same issue that ordinary Tor servers face. On the other hand, itprovides improved anonymity against some attacks too:\begin{verbatim}http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#ServerAnonymity\end{verbatim}\section{Future designs}\subsection{Bridges inside the blocked network too}Assuming actually crossing the firewall is the risky part of theoperation, can we have some bridge relays inside the blocked area too,and more established users can use them as relays so they don't need tocommunicate over the firewall directly at all? A simple example here isto make new blocked users into internal bridges also -- so they sign upon the BDA as part of doing their query, and we give out their addressesrather than (or along with) the external bridge addresses. This designis a lot trickier because it brings in the complexity of whether theinternal bridges will remain available, can maintain reachability withthe outside world, etc.Hidden services as bridges.%\bibliographystyle{plain} \bibliography{tor-design}\end{document}
 |