121-hidden-service-authentication.txt 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820
  1. Filename: 121-hidden-service-authentication.txt
  2. Title: Hidden Service Authentication
  3. Version: $Revision$
  4. Last-Modified: $Date$
  5. Author: Tobias Kamm, Thomas Lauterbach, Karsten Loesing, Ferdinand Rieger,
  6. Christoph Weingarten
  7. Created: 10-Sep-2007
  8. Status: Open
  9. Target: 0.2.1.x
  10. Change history:
  11. 26-Sep-2007 Initial proposal for or-dev
  12. 08-Dec-2007 Incorporated comments by Nick posted to or-dev on 10-Oct-2007
  13. 15-Dec-2007 Rewrote complete proposal for better readability, modified
  14. authentication protocol, merged in personal notes
  15. 24-Dec-2007 Replaced misleading term "authentication" by "authorization"
  16. and added some clarifications (comments by Sven Kaffille)
  17. 28-Apr-2008 Updated most parts of the concrete authorization protocol
  18. 04-Jul-2008 Add a simple algorithm to delay descriptor publication for
  19. different clients of a hidden service
  20. 19-Jul-2008 Added INTRODUCE1V cell type (1.2), improved replay
  21. protection for INTRODUCE2 cells (1.3), described limitations
  22. for auth protocols (1.6), improved hidden service protocol
  23. without client authorization (2.1), added second, more
  24. scalable authorization protocol (2.2), rewrote existing
  25. authorization protocol (2.3); changes based on discussion
  26. with Nick
  27. Overview:
  28. This proposal deals with a general infrastructure for performing
  29. authorization (not necessarily implying authentication) of requests to
  30. hidden services at three points: (1) when downloading and decrypting
  31. parts of the hidden service descriptor, (2) at the introduction point,
  32. and (3) at Bob's Tor client before contacting the rendezvous point. A
  33. service provider will be able to restrict access to his service at these
  34. three points to authorized clients only. Further, the proposal contains
  35. specific authorization protocols as instances that implement the
  36. presented authorization infrastructure.
  37. This proposal is based on v2 hidden service descriptors as described in
  38. proposal 114 and introduced in version 0.2.0.10-alpha.
  39. The proposal is structured as follows: The next section motivates the
  40. integration of authorization mechanisms in the hidden service protocol.
  41. Then we describe a general infrastructure for authorization in hidden
  42. services, followed by specific authorization protocols for this
  43. infrastructure. At the end we discuss a number of attacks and non-attacks
  44. as well as compatibility issues.
  45. Motivation:
  46. The major part of hidden services does not require client authorization
  47. now and won't do so in the future. To the contrary, many clients would
  48. not want to be (pseudonymously) identifiable by the service (though this
  49. is unavoidable to some extent), but rather use the service
  50. anonymously. These services are not addressed by this proposal.
  51. However, there may be certain services which are intended to be accessed
  52. by a limited set of clients only. A possible application might be a
  53. wiki or forum that should only be accessible for a closed user group.
  54. Another, less intuitive example might be a real-time communication
  55. service, where someone provides a presence and messaging service only to
  56. his buddies. Finally, a possible application would be a personal home
  57. server that should be remotely accessed by its owner.
  58. Performing authorization for a hidden service within the Tor network, as
  59. proposed here, offers a range of advantages compared to allowing all
  60. client connections in the first instance and deferring authorization to
  61. the transported protocol:
  62. (1) Reduced traffic: Unauthorized requests would be rejected as early as
  63. possible, thereby reducing the overall traffic in the network generated
  64. by establishing circuits and sending cells.
  65. (2) Better protection of service location: Unauthorized clients could not
  66. force Bob to create circuits to their rendezvous points, thus preventing
  67. the attack described by Øverlier and Syverson in their paper "Locating
  68. Hidden Servers" even without the need for guards.
  69. (3) Hiding activity: Apart from performing the actual authorization, a
  70. service provider could also hide the mere presence of his service from
  71. unauthorized clients when not providing hidden service descriptors to
  72. them, rejecting unauthorized requests already at the introduction
  73. point (ideally without leaking presence information at any of these
  74. points), or not answering unauthorized introduction requests.
  75. (4) Better protection of introduction points: When providing hidden
  76. service descriptors to authorized clients only and encrypting the
  77. introduction points as described in proposal 114, the introduction points
  78. would be unknown to unauthorized clients and thereby protected from DoS
  79. attacks.
  80. (5) Protocol independence: Authorization could be performed for all
  81. transported protocols, regardless of their own capabilities to do so.
  82. (6) Ease of administration: A service provider running multiple hidden
  83. services would be able to configure access at a single place uniformly
  84. instead of doing so for all services separately.
  85. (7) Optional QoS support: Bob could adapt his node selection algorithm
  86. for building the circuit to Alice's rendezvous point depending on a
  87. previously guaranteed QoS level, thus providing better latency or
  88. bandwidth for selected clients.
  89. A disadvantage of performing authorization within the Tor network is
  90. that a hidden service cannot make use of authorization data in
  91. the transported protocol. Tor hidden services were designed to be
  92. independent of the transported protocol. Therefore it's only possible to
  93. either grant or deny access to the whole service, but not to specific
  94. resources of the service.
  95. Authorization often implies authentication, i.e. proving one's identity.
  96. However, when performing authorization within the Tor network, untrusted
  97. points should not gain any useful information about the identities of
  98. communicating parties, neither server nor client. A crucial challenge is
  99. to remain anonymous towards directory servers and introduction points.
  100. However, trying to hide identity from the hidden service is a futile
  101. task, because a client would never know if he is the only authorized
  102. client and therefore perfectly identifiable. Therefore, hiding client
  103. identity from the hidden service is not aimed by this proposal.
  104. The current implementation of hidden services does not provide any kind
  105. of authorization. The hidden service descriptor version 2, introduced by
  106. proposal 114, was designed to use a descriptor cookie for downloading and
  107. decrypting parts of the descriptor content, but this feature is not yet
  108. in use. Further, most relevant cell formats specified in rend-spec
  109. contain fields for authorization data, but those fields are neither
  110. implemented nor do they suffice entirely.
  111. Details:
  112. 1. General infrastructure for authorization to hidden services
  113. We spotted three possible authorization points in the hidden service
  114. protocol:
  115. (1) when downloading and decrypting parts of the hidden service
  116. descriptor,
  117. (2) at the introduction point, and
  118. (3) at Bob's Tor client before contacting the rendezvous point.
  119. The general idea of this proposal is to allow service providers to
  120. restrict access to some or all of these points to authorized clients
  121. only.
  122. 1.1. Client authorization at directory
  123. Since the implementation of proposal 114 it is possible to combine a
  124. hidden service descriptor with a so-called descriptor cookie. If done so,
  125. the descriptor cookie becomes part of the descriptor ID, thus having an
  126. effect on the storage location of the descriptor. Someone who has learned
  127. about a service, but is not aware of the descriptor cookie, won't be able
  128. to determine the descriptor ID and download the current hidden service
  129. descriptor; he won't even know whether the service has uploaded a
  130. descriptor recently. Descriptor IDs are calculated as follows (see
  131. section 1.2 of rend-spec for the complete specification of v2 hidden
  132. service descriptors):
  133. descriptor-id =
  134. H(service-id | H(time-period | descriptor-cookie | replica))
  135. Currently, service-id is equivalent to permanent-id which is calculated
  136. as in the following formula. But in principle it could be any public
  137. key.
  138. permanent-id = H(permanent-key)[:10]
  139. The second purpose of the descriptor cookie is to encrypt the list of
  140. introduction points, including optional authorization data. Hence, the
  141. hidden service directories won't learn any introduction information from
  142. storing a hidden service descriptor. This feature is implemented but
  143. unused at the moment, so that this proposal will harness the advantages
  144. of proposal 114.
  145. The descriptor cookie can be used for authorization by keeping it secret
  146. from everyone but authorized clients. A service could then decide whether
  147. to publish hidden service descriptors using that descriptor cookie later
  148. on. An authorized client being aware of the descriptor cookie would be
  149. able to download and decrypt the hidden service descriptor.
  150. The number of concurrently used descriptor cookies for one hidden service
  151. is not restricted. A service could use a single descriptor cookie for all
  152. users, a distinct cookie per user, or something in between, like one
  153. cookie per group of users. It is up to the specific protocol and how it
  154. is applied by a service provider.
  155. Two or more hidden service descriptors for different groups or users
  156. should not be uploaded at the same time. A directory node could conclude
  157. easily that the descriptors, were issued by the same hidden service, thus
  158. being able to link the two groups or users. Therefore, descriptors for
  159. different users or clients that ought to be stored on the same directory
  160. are delayed, so that only one descriptor is uploaded to a directory at a
  161. time. The remaining descriptors are uploaded with a delay of 30 seconds.
  162. Further, descriptors for different groups or users that are to be stored
  163. on different directories are delayed for a random time of up to 30
  164. seconds to hide relations from colluding directories. Certainly, this
  165. does not prevent linking entirely, but it makes it somewhat harder.
  166. There is a conflict between hiding links between clients and making a
  167. service available in a timely manner.
  168. Although this part of the proposal is meant to describe a general
  169. infrastructure for authorization, changing the way of using the
  170. descriptor cookie to look up hidden service descriptors, e.g. applying
  171. some sort of asymmetric crypto system, would require in-depth changes
  172. that would be incompatible to v2 hidden service descriptors. On the
  173. contrary, using another key for en-/decrypting the introduction point
  174. part of a hidden service descriptor, e.g. a different symmetric key or
  175. asymmetric encryption, would be easy to implement and compatible to v2
  176. hidden service descriptors as understood by hidden service directories
  177. (clients and servers would have to be upgraded anyway for using the new
  178. features).
  179. 1.2. Client authorization at introduction point
  180. The next possible authorization point after downloading and decrypting
  181. a hidden service descriptor is the introduction point. It may be important
  182. for authorization, because it bears the last chance of hiding presence
  183. of a hidden service from unauthorized clients. Further, performing
  184. authorization at the introduction point might reduce traffic in the
  185. network, because unauthorized requests would not be passed to the
  186. hidden service. This applies to those clients who are aware of a
  187. descriptor cookie and thereby of the hidden service descriptor, but do
  188. not have authorization data to pass the introduction point or access the
  189. service (such a situation might occur when authorization data for
  190. authorization at the directory is not issued on a per-user base as
  191. opposed to authorization data for authorization at the introduction
  192. point).
  193. It is important to note that the introduction point must be considered
  194. untrustworthy, and therefore cannot replace authorization at the hidden
  195. service itself. Nor should the introduction point learn any sensitive
  196. identifiable information from either server or client.
  197. In order to perform authorization at the introduction point, three
  198. message formats need to be modified: (1) v2 hidden service descriptors,
  199. (2) ESTABLISH_INTRO cells, and (3) INTRODUCE1 cells.
  200. A v2 hidden service descriptor needs to contain authorization data that
  201. is introduction-point-specific and sometimes also authorization data
  202. that is introduction-point-independent. Therefore, v2 hidden service
  203. descriptors as specified in section 1.2 of rend-spec already contain two
  204. reserved fields "intro-authorization" and "service-authorization"
  205. (originally, the names of these fields were "...-authentication")
  206. containing an authorization type number and arbitrary authorization
  207. data. We propose that authorization data consists of base64 encoded
  208. objects of arbitrary length, surrounded by "-----BEGIN MESSAGE-----" and
  209. "-----END MESSAGE-----". This will increase the size of hidden service
  210. descriptors, which however is possible, as there is no strict upper
  211. limit.
  212. The current ESTABLISH_INTRO cells as described in section 1.3 of
  213. rend-spec do not contain either authorization data or version
  214. information. Therefore, we propose a new version 1 of the ESTABLISH_INTRO
  215. cells adding these two issues as follows:
  216. V Format byte: set to 255 [1 octet]
  217. V Version byte: set to 1 [1 octet]
  218. KL Key length [2 octets]
  219. PK Bob's public key [KL octets]
  220. HS Hash of session info [20 octets]
  221. AUTHT The auth type that is supported [1 octet]
  222. AUTHL Length of auth data [2 octets]
  223. AUTHD Auth data [variable]
  224. SIG Signature of above information [variable]
  225. From the format it is possible to determine the maximum allowed size for
  226. authorization data: given the fact that cells are 512 octets long, of
  227. which 498 octets are usable (see section 6.1 of tor-spec), and assuming
  228. 1024 bit = 128 octet long keys, there are 215 octets left for
  229. authorization data. Hence, authorization protocols are bound to use no
  230. more than these 215 octets, regardless of the number of clients that
  231. shall be authenticated at the introduction point. Otherwise, one would
  232. need to send multiple ESTABLISH_INTRO cells or split them up, what we do
  233. not specify here.
  234. In order to understand a v1 ESTABLISH_INTRO cell, the implementation of
  235. a relay must have a certain Tor version. Hidden services need to be able
  236. to distinguish relays being capable of understanding the new v1 cell
  237. formats and perform authorization. We propose to use the version number
  238. that is contained in networkstatus documents to find capable
  239. introduction points.
  240. The current INTRODUCE1 cells as described in section 1.8 of rend-spec is
  241. not designed to carry authorization data and has no version number, too.
  242. Unfortunately, unversioned INTRODUCE1 cells consist only of a fixed-size,
  243. seemingly random PK_ID, followed by the encrypted INTRODUCE2 cell. This
  244. makes it impossible to distinguish unversioned INTRODUCE1 cells from any
  245. later format. In particular, it is not possible to introduce some kind of
  246. format and version byte for newer versions of this cell. That's probably
  247. where the comment "[XXX011 want to put intro-level auth info here, but no
  248. version. crap. -RD]" that was part of rend-spec some time ago comes from.
  249. We propose that new versioned INTRODUCE1 cells use the new cell type 41
  250. RELAY_INTRODUCE1V (where V stands for versioned):
  251. Cleartext
  252. V Version byte: set to 1 [1 octet]
  253. PK_ID Identifier for Bob's PK [20 octets]
  254. AUTHT The auth type that is supported [1 octet]
  255. AUTHL Length of auth data [2 octets]
  256. AUTHD Auth data [variable]
  257. Encrypted to Bob's PK:
  258. (RELAY_INTRODUCE2 cell)
  259. The maximum length of contained authorization data depends on the length
  260. of the contained INTRODUCE2 cell. A calculation follows below when
  261. describing the INTRODUCE2 cell format we propose to use.
  262. 1.3. Client authorization at hidden service
  263. The time when a hidden service receives an INTRODUCE2 cell constitutes
  264. the last possible authorization point during the hidden service
  265. protocol. Performing authorization here is easier than at the other two
  266. authorization points, because there are no possibly untrusted entities
  267. involved.
  268. In general, a client that is successfully authorized at the introduction
  269. point should be granted access at the hidden service, too. Otherwise, the
  270. client would receive a positive INTRODUCE_ACK cell from the introduction
  271. point and conclude that it may connect to the service, but the request
  272. will be dropped without notice. This would appear as a failure to
  273. clients. Therefore, the number of cases in which a client successfully
  274. passes the introduction point, but fails at the hidden service should be
  275. zero. However, this does not lead to the conclusion, that the
  276. authorization data used at the introduction point and the hidden service
  277. must be the same, but only that both authorization data should lead to
  278. the same authorization result.
  279. Authorization data is transmitted from client to server via an
  280. INTRODUCE2 cell that is forwarded by the introduction point. There are
  281. versions 0 to 2 specified in section 1.8 of rend-spec, but none of these
  282. contains fields for carrying authorization data. We propose a slightly
  283. modified version of v3 INTRODUCE2 cells that is specified in section
  284. 1.8.1 and which is not implemented as of December 2007. In contrast to
  285. the specified v3 we avoid specifying (and implementing) IPv6 capabilities,
  286. because Tor relays will be required to support IPv4 addresses for a long
  287. time in the future, so that this seems unnecessary at the moment. The
  288. proposed format of v3 INTRODUCE2 cells is as follows:
  289. VER Version byte: set to 3. [1 octet]
  290. AUTHT The auth type that is used [1 octet]
  291. AUTHL Length of auth data [2 octets]
  292. AUTHD Auth data [variable]
  293. TS Timestamp (seconds since 1-1-1970) [4 octets]
  294. IP Rendezvous point's address [4 octets]
  295. PORT Rendezvous point's OR port [2 octets]
  296. ID Rendezvous point identity ID [20 octets]
  297. KLEN Length of onion key [2 octets]
  298. KEY Rendezvous point onion key [KLEN octets]
  299. RC Rendezvous cookie [20 octets]
  300. g^x Diffie-Hellman data, part 1 [128 octets]
  301. The maximum possible length of authorization data is related to the
  302. enclosing INTRODUCE1V cell. A v3 INTRODUCE2 cell with
  303. 1024 bit = 128 octets long public keys without any authorization data
  304. occupies 306 octets (AUTHL is only used when AUTHT has a value != 0),
  305. plus 58 octets for hybrid public key encryption (see
  306. section 5.1 of tor-spec on hybrid encryption of CREATE cells). The
  307. surrounding INTRODUCE1V cell requires 24 octets. This leaves only 110
  308. of the 498 available octets free, which must be shared between
  309. authorization data to the introduction point _and_ to the hidden
  310. service.
  311. When receiving a v3 INTRODUCE2 cell, Bob checks whether a client has
  312. provided valid authorization data to him. He also requires that the
  313. timestamp is no more than 30 minutes in the past or future and that the
  314. rendezvous cookie has not been used in the past 60 minutes to prevent
  315. replay attacks by rogue introduction points. If all checks pass, Bob
  316. builds a circuit to the provided rendezvous point and otherwise drops the
  317. cell.
  318. 1.4. Summary of authorization data fields
  319. In summary, the proposed descriptor format and cell formats provide the
  320. following fields for carrying authorization data:
  321. (1) The v2 hidden service descriptor contains:
  322. - a descriptor cookie that is used for the lookup process, and
  323. - an arbitrary encryption schema to ensure authorization to access
  324. introduction information (currently symmetric encryption with the
  325. descriptor cookie).
  326. (2) For performing authorization at the introduction point we can use:
  327. - the fields intro-authorization and service-authorization in
  328. hidden service descriptors,
  329. - a maximum of 215 octets in the ESTABLISH_INTRO cell, and
  330. - one part of 110 octets in the INTRODUCE1V cell.
  331. (3) For performing authorization at the hidden service we can use:
  332. - the fields intro-authorization and service-authorization in
  333. hidden service descriptors,
  334. - the other part of 110 octets in the INTRODUCE2 cell.
  335. It will also still be possible to access a hidden service without any
  336. authorization or only use a part of the authorization infrastructure.
  337. However, this requires to consider all parts of the infrastructure. For
  338. example, authorization at the introduction point relying on confidential
  339. intro-authorization data transported in the hidden service descriptor
  340. cannot be performed without using an encryption schema for introduction
  341. information.
  342. 1.5. Managing authorization data at servers and clients
  343. In order to provide authorization data at the hidden server and the
  344. authenticated clients, we propose to use files---either the tor
  345. configuration file or separate files. The exact format of these special
  346. files depends on the authorization protocol used.
  347. Currently, rend-spec contains the proposition to encode client-side
  348. authorization data in the URL, like in x.y.z.onion. This was never used
  349. and is also a bad idea, because in case of HTTP the requested URL may be
  350. contained in the Host and Referer fields.
  351. 1.6. Limitations for authorization protocols
  352. There are two limitations of the current hidden service protocol for
  353. authorization protocols that shall be identified here.
  354. 1. The three cell types ESTABLISH_INTRO, INTRODUCE1V, and INTRODUCE2
  355. restricts the amount of data that can be used for authorization.
  356. This forces authorization protocols that require per-user
  357. authorization data at the introduction point to restrict the number
  358. of authorized clients artifically. A possible solution could be to
  359. split contents among multiple cells and reassemble them at the
  360. introduction points.
  361. 2. The current hidden service protocol does not specify cell types to
  362. perform interactive authorization between client and introduction
  363. point or hidden service. If there should be an authorization
  364. protocol that requires interaction, new cell types would have to be
  365. defined and integrated into the hidden service protocol.
  366. 2. Specific authorization protocol instances
  367. In the following we present three specific authorization protocols that
  368. make use of (parts of) the new authorization infrastructure:
  369. 1. The first protocol does not really perform client authorization, but
  370. requires clients to have downloaded a service descriptor before
  371. establishing a connection in order to prevent introduction points
  372. from accessing a service.
  373. 2. The second protocol allows a service provider to restrict access
  374. to clients with a previously received secret key only, but does not
  375. attempt to hide service activity from others.
  376. 3. The third protocol, albeit being feasible for a limited set of about
  377. 16 clients, performs client authorization and hides service activity
  378. from everyone but the authorized clients.
  379. These three protocol instances together are intended to replace the
  380. existing hidden service protocol versions 0 and 2 in the long run and
  381. shall therefore be considered hidden service protocol version 3. All
  382. changes in this version 3 are designed to be fully backward-compatible to
  383. version 2 and can be run in parallel to version 0.
  384. 2.1. Services without client authorization
  385. Although hidden services without client authorization could be run as
  386. before, this proposal allows us to add a new security property at almost
  387. no costs: Denying the introduction points to access the hidden service.
  388. While this constitutes a defense against rogue introduction points, it
  389. also reduces responsibility of a Tor node operator for the doings of a
  390. hidden service offering illegal or unethical contents.
  391. The original hidden service design used the service's permanent key to
  392. establish introduction points. If an introduction point wanted to access
  393. the service, it could easily download the service's descriptor using its
  394. permanent key ID and establish a connection or generate an INTRODUCE2
  395. cell itself and forward it directly to the service.
  396. Hidden service protocol version 2 made it more difficult for introduction
  397. points to find out which service they are serving. Here, the hidden
  398. service created a fresh introduction key for each introduction point
  399. which 1) did not reveal the hidden service's identity and 2) did not
  400. allow downloading the service's descriptor. However, the introduction
  401. point could still generate an INTRODUCE2 cell itself and establish a
  402. connection to the service to find out what it is serving.
  403. Beginning with this proposal can include a so-called "introduction
  404. cookie" in v2 hidden service descriptors and v3 INTRODUCE2 cells. If
  405. both, service and client implement this proposal, a service receiving a
  406. v3 INTRODUCE2 cell with an introduction cookie in it can be sure that the
  407. client has downloaded its descriptor before. As long as hidden services
  408. also permit v2 INTRODUCE2 cells, introduction points can work around this
  409. safeguard. But the earlier this protocol is introduced, the earlier the
  410. services can stop supporting version 2 introductions.
  411. A hidden service generates a unique introduction cookie for each
  412. established introduction point and puts it in the "intro-authentication"
  413. field in its descriptor for auth-type "1". Further, the service sets the
  414. "protocol-versions" field to "2,3" to announce that it understands both,
  415. requests with and without introduction cookie. Clients that understand
  416. protocol version 3 include the introduction cookie in the v3 INTRODUCE2
  417. cell as auth-type "1" that they send to the service. (Clients that don't
  418. understand the protocol v3 do not recognize the authorization data and
  419. send a v2 INTRODUCE2 cell as usual.) The hidden service can compare a
  420. received introduction cookie with the value that it expects and grant or
  421. deny service correspondingly.
  422. 2.2. Service with large-scale client authorization
  423. The first client authorization protocol aims at performing access control
  424. while consuming as little additional resources as possible. A service
  425. provider should be able to permit access to a large number of clients
  426. while denying access for everyone else. However, the price for
  427. scalability is that the service won't be able to hide its activity from
  428. unauthorized or formerly authorized clients.
  429. The main idea of this protocol is to encrypt the introduction-point part
  430. in hidden service descriptors to authorized clients using symmetric keys.
  431. This ensures that nobody else but authorized clients can learn which
  432. introduction points a service currently uses, nor can someone send a
  433. valid INTRODUCE1 message without knowing the introduction key. Therefore,
  434. a subsequent authorization at the introduction point is not required.
  435. A service provider generates symmetric "descriptor cookies" for his
  436. clients and distributes them outside of Tor. The suggested key size is
  437. 128 bits, so that descriptor cookies can be encoded in 22 base64 chars
  438. (which can hold up to 22 * 5 = 132 bits, leaving 4 bits to encode the
  439. authorization type "2" and allow a client to distinguish this
  440. authorization protocol from others like the one proposed below).
  441. Typically, the contact information for a hidden service using this
  442. authorization protocol looks like this:
  443. v2cbb2l4lsnpio4q.onion Ll3X7Xgz9eHGKCCnlFH0uz
  444. When generating a hidden service descriptor, the service encrypts the
  445. introduction-point part with a single randomly generated symmetric
  446. 128-bit session key using AES-CTR as described for v2 hidden service
  447. descriptors in rend-spec. Afterwards, the service encrypts the session
  448. key to all descriptor cookies using AES.
  449. ### What would be a simple solution to include n encrypted session keys
  450. ### in the descriptor? The format may be binary and has no strict upper
  451. ### size limit. An authorized client should be able to efficiently find
  452. ### the session key that is encrypted for him/her. It should be
  453. ### impossible to track certain authorized clients over time by finding
  454. ### that the session key was encrypted for them in different descriptors.
  455. ### It should be hard to determine the exact number of authorized
  456. ### clients.
  457. ###
  458. ### Here comes the voodoo I've conceived:
  459. ###
  460. ### ATYPE Authorization type: set to 2. [1 octet]
  461. ### ALEN Number of authorized clients div 16 [1 octet]
  462. ### for each symmetric descriptor cookie:
  463. ### ID Client ID: H(descriptor cookie | IV)[:4] [4 octets]
  464. ### SKEY Session key encrypted with descriptor cookie [16 octets]
  465. ### (end of client-specific part)
  466. ### RND Random data [(16 - (number-of-clients mod 16)) * 20 octets]
  467. ### IV AES initialization vector [16 octets]
  468. ### IPOS Intro points, encrypted with session key [remaining octets]
  469. An authorized client needs to configure Tor to use the descriptor cookie
  470. when accessing the hidden service. Therefore, a user adds the contact
  471. information that she received from the service provider to her torrc
  472. file. Upon downloading a hidden service descriptor, Tor finds the
  473. encrypted introduction-point part and attempts to decrypt it using the
  474. configured descriptor cookie. (In the rare event of two or more client
  475. IDs being equal a client tries to decrypt all of them.)
  476. Upon sending the introduction, the client includes her descriptor cookie
  477. as auth type "2" in the INTRODUCE2 cell that she sends to the service.
  478. The hidden service checks whether the included descriptor cookie is
  479. authorized to access the service and either responds to the introduction
  480. request, or not.
  481. 2.3. Authorization for limited number of clients
  482. A second, more sophisticated client authorization protocol goes the extra
  483. mile of hiding service activity from unauthorized clients. With all else
  484. being equal to the preceding authorization protocol, the second protocol
  485. publishes hidden service descriptors for each user separately and gets
  486. along with encrypting the introduction-point part of descriptors to a
  487. single client. This allows the service to stop publishing descriptors for
  488. removed clients. As long as a removed client cannot link descriptors
  489. issued for other clients to the service, it cannot derive service
  490. activity any more. The downside of this approach is limited scalability.
  491. Even though the distributed storage of descriptors (cf. proposal 114)
  492. tackles the problem of limited scalability to a certain extent, this
  493. protocol should not be used for services with more than 16 clients. (In
  494. fact, Tor should refuse to advertise services for more than this number
  495. of clients.)
  496. A hidden service generates an asymmetric "client key" and a symmetric
  497. "descriptor cookie" for each client. The client key is used as
  498. replacement for the service's permanent key, so that the service uses a
  499. different identity for each of his clients. The descriptor cookie is used
  500. to store descriptors at changing directory nodes that are unpredictable
  501. for anyone but service and client, to encrypt the introduction-point
  502. part, and to be included in INTRODUCE2 cells. Once the service has
  503. created client key and descriptor cookie, he tells them to the client
  504. outside of Tor. The contact information string looks similar to the one
  505. used by the preceding authorization protocol (with the only difference
  506. that it has "3" encoded as auth-type in the remaining 4 of 132 bits
  507. instead of "2" as before).
  508. When creating a hidden service descriptor for an authorized client, the
  509. hidden service uses the client key and descriptor cookie to compute
  510. secret ID part and descriptor ID:
  511. secret-id-part = H(time-period | descriptor-cookie | replica)
  512. descriptor-id = H(client-key[:10] | secret-id-part)
  513. The hidden service also replaces permanent-key in the descriptor with
  514. client-key and encrypts introduction-points with the descriptor cookie.
  515. ATYPE Authorization type: set to 3. [1 octet]
  516. IV AES initialization vector [16 octets]
  517. IPOS Intro points, encr. with descriptor cookie [remaining octets]
  518. When uploading descriptors, the hidden service needs to make sure that
  519. descriptors for different clients are not uploaded at the same time (cf.
  520. Section 1.1) which is also a limiting factor for the number of clients.
  521. When a client is requested to establish a connection to a hidden service
  522. it looks up whether it has any authorization data configured for that
  523. service. If the user has configured authorization data for authorization
  524. protocol "3", the descriptor ID is determined as described in the last
  525. paragraph. Upon receiving a descriptor, the client decrypts the
  526. introduction-point part using its descriptor cookie. Further, the client
  527. includes its descriptor cookie as auth-type "3" in INTRODUCE2 cells that
  528. it sends to the service.
  529. 2.4. Hidden service configuration
  530. A hidden service that implements this proposal and that is meant to use
  531. the new protocols (including the protocol without client authorization as
  532. described in 2.1) adds version 3 to the list of supported hidden service
  533. protocols:
  534. HiddenServiceVersion version,version,... (Default: 0, 2, 3)
  535. If the service shall perform client authorization, another config option
  536. is set to either "1" for the protocol described in 2.2 or "2" for the
  537. protocol in 2.3 (auth type numbers differ from the internally used
  538. numbers primarily to avoid user questions about the whereabouts of auth
  539. type 1). This config option also includes a comma-separated list of
  540. human-readable client names, so that Tor can create authorization data
  541. for these clients:
  542. HiddenServiceAuthorizeClient auth-type client-name,client-name,...
  543. If this option is configured, HiddenServiceVersion is automatically
  544. reconfigured to contain only version numbers of 3 or higher. If this
  545. config option is not set but the configured hidden service version
  546. includes 3, the protocol without client authorization as described in 2.1
  547. is offered to clients (possibly in parallel to versions 0 and 2).
  548. Tor stores all generated authorization data for the authorization
  549. protocols described in Sections 2.2 and 2.3 in a new file using the
  550. following file format:
  551. "client-name" human-readable client identifier NL
  552. "descriptor-cookie" 128-bit key ^= 22 base64 chars NL
  553. If the authorization protocol of Section 2.3 is used, Tor also generates
  554. and stores the following data:
  555. "service-address" client-specific-onion-address NL
  556. "client-key" NL a public key in PEM format
  557. 2.5. Client configuration
  558. Clients need to make their authorization data known to Tor using another
  559. configuration option that contains a service name (mainly for the sake of
  560. convenience), the service address, and the descriptor cookie that is
  561. required to access a hidden service (the authorization protocol number is
  562. encoded in the descriptor cookie):
  563. HidServAuth service-name service-address descriptor-cookie
  564. Security implications:
  565. In the following we want to discuss possible attacks by dishonest
  566. entities in the presented infrastructure and specific protocol. These
  567. security implications would have to be verified once more when adding
  568. another protocol. The dishonest entities (theoretically) include the
  569. hidden server itself, the authenticated clients, hidden service directory
  570. nodes, introduction points, and rendezvous points. The relays that are
  571. part of circuits used during protocol execution, but never learn about
  572. the exchanged descriptors or cells by design, are not considered.
  573. Obviously, this list makes no claim to be complete. The discussed attacks
  574. are sorted by the difficulty to perform them, in ascending order,
  575. starting with roles that everyone could attempt to take and ending with
  576. partially trusted entities abusing the trust put in them.
  577. (1) A hidden service directory could attempt to conclude presence of a
  578. server from the existence of a locally stored hidden service descriptor:
  579. This passive attack is possible only for a single client-service
  580. relation, because descriptors need to contain a
  581. publicly visible signature of the server using the client key
  582. A possible protection
  583. would be to increase the number of hidden service directories in the
  584. network.
  585. (2) A hidden service directory could try to break the descriptor cookies
  586. of locally stored descriptors: This attack can be performed offline. The
  587. only useful countermeasure against it might be using safe passwords that
  588. are generated by Tor.
  589. (3) An introduction point could try to identify the pseudonym of the
  590. hidden service on behalf of which it operates: This is impossible by
  591. design, because the service uses a fresh public key for every
  592. establishment of an introduction point (see proposal 114) and the
  593. introduction point receives a fresh introduction cookie, so that there is
  594. no identifiable information about the service that the introduction point
  595. could learn. The introduction point cannot even tell if client accesses
  596. belong to the same client or not, nor can it know the total number of
  597. authorized clients. The only information might be the pattern of
  598. anonymous client accesses, but that is hardly enough to reliably identify
  599. a specific service.
  600. (4) An introduction point could want to learn the identities of accessing
  601. clients: This is also impossible by design, because all clients use the
  602. same introduction cookie for authorization at the introduction point.
  603. (5) An introduction point could try to replay a correct INTRODUCE1 cell
  604. to other introduction points of the same service, e.g. in order to force
  605. the service to create a huge number of useless circuits: This attack is
  606. not possible by design, because INTRODUCE1 cells are encrypted using a
  607. freshly created introduction key that is only known to authorized
  608. clients.
  609. (6) An introduction point could attempt to replay a correct INTRODUCE2
  610. cell to the hidden service, e.g. for the same reason as in the last
  611. attack: This attack is very limited by the fact that a server will only
  612. accept 3 INTRODUCE2 cells containing the same rendezvous cookie and drop
  613. all further replayed cells.
  614. (7) An introduction point could block client requests by sending either
  615. positive or negative INTRODUCE_ACK cells back to the client, but without
  616. forwarding INTRODUCE2 cells to the server: This attack is an annoyance
  617. for clients, because they might wait for a timeout to elapse until trying
  618. another introduction point. However, this attack is not introduced by
  619. performing authorization and it cannot be targeted towards a specific
  620. client. A countermeasure might be for the server to periodically perform
  621. introduction requests to his own service to see if introduction points
  622. are working correctly.
  623. (8) The rendezvous point could attempt to identify either server or
  624. client: This remains impossible as it was before, because the
  625. rendezvous cookie does not contain any identifiable information.
  626. (9) An authenticated client could swamp the server with valid INTRODUCE1
  627. and INTRODUCE2 cells, e.g. in order to force the service to create
  628. useless circuits to rendezvous points; as opposed to an introduction
  629. point replaying the same INTRODUCE2 cell, a client could include a new
  630. rendezvous cookie for every request: The countermeasure for this attack
  631. is the restriction to 10 connection establishments per client and hour.
  632. Compatibility:
  633. An implementation of this proposal would require changes to hidden
  634. servers and clients to process authorization data and encode and
  635. understand the new formats. However, both servers and clients would
  636. remain compatible to regular hidden services without authorization.
  637. Implementation:
  638. The implementation of this proposal can be divided into a number of
  639. changes to hidden service and client side. There are no
  640. changes necessary on directory, introduction, or rendezvous nodes. All
  641. changes are marked with either [service] or [client] do denote on which
  642. side they need to be made.
  643. /1/ Configure client authorization [service]
  644. - Parse configuration option HiddenServiceAuthorizeClient containing
  645. authorized client names.
  646. - Load previously created client keys and descriptor cookies.
  647. - Generate missing client keys and descriptor cookies, add them to
  648. client_keys file.
  649. - Rewrite the hostname file.
  650. - Keep client keys and descriptor cookies of authorized clients in
  651. memory.
  652. [- In case of reconfiguration, mark which client authorizations were
  653. added and whether any were removed. This can be used later when
  654. deciding whether to rebuild introduction points and publish new
  655. hidden service descriptors. Not implemented yet.]
  656. /2/ Publish hidden service descriptors [service]
  657. - Create and upload hidden service descriptors for all authorized
  658. clients.
  659. [- See /1/ for the case of reconfiguration.]
  660. /3/ Configure permission for hidden services [client]
  661. - Parse configuration option HidServAuth containing service
  662. authorization, store authorization data in memory.
  663. /5/ Fetch hidden service descriptors [client]
  664. - Look up client authorization upon receiving a hidden service request.
  665. - Request hidden service descriptor ID including client key and
  666. descriptor cookie. Only request v2 descriptors, no v0.
  667. /6/ Process hidden service descriptor [client]
  668. - Decrypt introduction points with descriptor cookie.
  669. /7/ Create introduction request [client]
  670. - Include descriptor cookie in INTRODUCE2 cell to introduction point.
  671. - Pass descriptor cookie around between involved connections and
  672. circuits.
  673. /8/ Process introduction request [service]
  674. - Read descriptor cookie from INTRODUCE2 cell.
  675. - Check whether descriptor cookie is authorized for access, including
  676. checking access counters.
  677. - Log access for accountability.