1 / 31

236349  Project in Computer Security

236349  Project in Computer Security. Integrating TOR’s attacks into the I2P darknet. Chen Avnery Amihay Vinter. Outline. The Problem. 1. DarkNets (TOR & I2P). 2. BitTorrent Protocol. 3. BitTorrent over I2P Volnurability. 4. Setting up the lab. 5. Results. 6. Outline.

peony
Download Presentation

236349  Project in Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 236349 Project in Computer Security Integrating TOR’s attacks into the I2P darknet Chen Avnery AmihayVinter

  2. Outline The Problem 1 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 BitTorrent over I2P Volnurability 4 Setting up the lab 5 Results 6

  3. Outline The Problem 1 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 BitTorrent over I2P Volnurability 4 Setting up the lab 5 Results 6

  4. The problem • Since the first designs of the World Wide Web, it was never supposed to support anonymity of users or servers. • Today, users and servers find the need to hide their identity in order to give or receive services. • A known example is giving true information to people in totalitarian nations. • To help users and servers hide their identity, new methods were developed like TOR and I2P. • TOR and I2P are Darknets that can create anonymity for users and servers, but of course, there are holes that make them vulnerable.

  5. Outline The Problem 1 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 BitTorrent over I2P Volnurability 4 Setting up the lab 5 Results 6

  6. TOR • TOR is a Darknet network that uses nodes (computers that are registered in the TOR network) to create its anonymity. • When Alice (a user) wants to connect to Bob’s server, she create a random and encrypted path (of 3 nodes) while using a DH keys. • The connection to Bob’s server is via the “exit” node (the third node in the path) and this connection is the only connection that is not encrypted. • Alice can now communicate with Bob via 3 nodes and Bob will not be able to find Alice’s Identity.

  7. TOR (Cont.) • TOR attacks: • Browser-Based Attacks on Tor http://web.mit.edu/tabbott/www/papers/tor.pdf • A New Replay Attack Against Anonymous Communication Networks - http://www.cs.uml.edu/~xinwenfu/paper/ICC08_Fu.pdf • Compromising Tor Anonymity Exploiting P2P Information Leakage - http://hal.inria.fr/docs/00/47/15/56/PDF/TorBT.pdf • Our goal is to find a way to use TOR’s vulnerabilities to I2P’s Darknet.

  8. I2P • I2P supplying the anonymity through the application layer. • Servers in the darknet of I2P are called eepsites. • A user that wishes to get a service from an eepsite, needs to know the eepsite’s name and it can be obtained from the web easily enough. • Easily enough means going to a fixed URL and fetching “routerinfo” files. • Once Alice (a user) gets the eepsite’s information, a tunnel from her to the eepsite is created automatically once she tries connecting to it. NOTE: Both sides need to install I2P service.

  9. I2P (Cont.) • Once the tunnel is up, Alice will communicate with the eepsite via proxies that the I2P configured or she configured manually. • The methodology of the darknet itself (through whom and how Alice is actually connecting to the eepsite) is less important for our goal and therefore will not be explained here.

  10. Outline The Problem 1 BitTorrent Protocol 3 DarkNets (TOR & I2P) 2 BitTorrent over I2P Volnurability 4 Setting up the lab 5 Results 6

  11. The Torrent World • The torrent world consist of two elements: • A BitTorrent Client: Each user that wants to download or upload a file - needs a client. • A BitTorrent Tracker: The tracker is a server that holds all the peers of a torrent in a DHT (Distributing Hash Table). • BitTorrent is a peer-to-peer application client that users use to download/upload files from each other. • When a user wants to download a file, his BitTorrent client asks for the list of peers from the Tracker. The peers that are sent are the peers that registered for that torrent in the tracker.

  12. Outline The Problem BitTorrent over I2P Volnurability 1 4 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 Setting up the lab 5 Results 6

  13. BitTorrent Encryption? • The BitTorrent protocol supports encryption by it’s own, it’s not used by most clients and not tested thoroughly. • I2P allows a client to download/upload files from/to peers via the I2P darknet. • Too good to be true? Because it is. Downloading via the I2P darknet is extremely slow (4KB/s instead of 1.5MB/s) so most users don’t use this feature. • THIS IS WHERE WE COME IN…

  14. Most Users Encryption Style • Most users that use I2P, use it only for connecting to the tracker and asking for a peers list. • Once a client received the peers list, it connects to each peer in a NON-ENCRYPTED fashion. • We need to find a way to map the peers list’s request (via I2P) from the tracker to the connection of the sent peer (Real IP).

  15. BitTorrent Protocol Encrypted via I2P Connection not Encrypted

  16. Work plan • Our plan is to set up a tracker, proxy server and an optional peer to host the data. • Controlling them is simply enough and will help us map those I2P hosts that tried to download the file we have set up. • The peer that hosts the data is optional because the mapping can be done without it. However, having it and letting others download from it is a proof of download.

  17. Work plan (Cont.) Alice asks for a peers list from the tracker (using I2P) The tracker sends the proxy’s IP and some port To Alice’s I2P address Alice tries to connect to the proxy IP at the given port from her REAL IP The proxy passes the message to bob (as a real proxy) The anonymous host (via I2P) that asked the tracker for the peers list and got the proxy’s ip and port X, is the REAL IP that tried to connect to the proxy at port X. The proxy identifies Alice’s REAL IP while she’s trying to connect to the given port End of session - Alice’s REAL IP is found

  18. Work plan (Cont.) Encrypted via I2P Not Encrypted Forwarding to Bob in order for Alice to download the file (proof) Bob • Let the proxy listen to ports 1000-30000. • Each time the tracker gets a request for the peers list, it picks a port that wasn’t used for some time and send it (along with the proxy’s IP) • We can use multiple proxies if there are too many peers list requests. • Alice’s REAL IP is found when she’s connecting via an unencrypted fashion to the proxy at the given port. 3 (Optional) Proxy Server Alice 2 Connecting to Port X Proxy’s IP, Port X 1 tracker.i2p

  19. Outline The Problem 1 Setting up the lab 5 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 BitTorrent over I2P Volnurability 4 Results 6

  20. Tracker • We found an open source Tracker (called MonoTorrent) • We’ve added a feature so it will receive I2P connections (from IP Address 127.0.0.1).

  21. Tracker

  22. Tracker (Cont.) • We programmed the tracker to send any IP and port of our liking to a peers list request – We use this so it will send the proxy’s data. • 107.21.175.171 is the proxy’s IP Address. • 10000 is the designated port.

  23. Torrent • When a client wants to use a service via I2P, it connects to it via a proxy – IP: 127.0.0.1 , Port: 4444. • This is the I2P proxy installed on the local machine, waiting for connections. • When connecting through the I2P proxy, all hosts must be of I2P’s nature (***.i2p). • The translation is done by a global directory service (The routerinfo files we talked about earlier).

  24. Torrent (Cont.)

  25. Torrent (Cont.) • In case you missed the checkboxes, have a look again: • Most users use the proxy (I2P encryption/anonymity) for hostname lookups ONLY and NOT for the connection themselves.

  26. Torrent (Cont.) • Downloading the file – “Talking” to the tracker via I2P and the seeder via Non-Encrypted way.

  27. Back To The Tracker • Alice is downloading now– The Tracker sent the peers list of our demand. • UT3200… is Alice’s client Peer-ID.

  28. Victory – Alice’s IP found

  29. Outline The Problem Results 1 6 DarkNets (TOR & I2P) 2 BitTorrent Protocol 3 BitTorrent over I2P Volnurability 4 Setting up the lab 5

  30. Results • Alice’s Real IP is found. • Port maximum range is 65,535.There is no problem, because we can use 100 proxies, each of them will use 30,000 ports. • That gives us 3,000,000 clients at peek time while all ports are in use. • The clients have no idea that their real IP is hacked.

  31. Further Reading • Articles: • One Bad Apple Spoils The Bunch • Compromising Tor Anonymity Exploiting P2P Information Leakage • Projects: • MonoTorrent project • Standards (RFC): • BitTorrent Protocol -- BTP/1.0 RFC • BitTorrent Specification

More Related