1 A seminar on TOR NETWORK By: Shaik Arbaaz Ahmed Under the Guidance of:Prof . Mujahid Irfan sir 2 Contents What is TOR…? Why do we need anonymity? How normal Internet connection works? How TOR network works? Decryption in TOR TOR Users Dangers of using Tor Network Conclusion 3 What is TOR…?? The Onion Routing Open source project Used for anonymity Supports only TCP No observer can tell where data comes from/going Give access to dark-web and deep-web It route your traffic through 3 different routers 4 Why do we need anonymity? To hide user personal information Protect to user traffic from advertisers To hide browsing pattern from employer or ISP Protection from hackers Freedom from surveillance of government Freedom of Thought and Speech Freedom of Social and Political Activities How normal Internet connection works? Direct connection to the internet Server to Server connection Traffic is not encrypted anyone can intercept your traffic 5 6 How normal Internet connection works? Internet packet have two parts Header Source address Destination address Time Cannot be hidden by encryption Datapayload The request or messag Can be hidden by encryption How TOR network works? Components of TOR Client: the user of the Tor network Server: the target TCP applications such as web servers Tor (onion) router: the special proxy relays the application data Directory server: servers holding Tor router information 7 8 How TOR network works? Onion-Routers/ Nodes Sender chooses a random sequence of routers Some routers are honest, some controlled by attacker Sender controls the length of the path 9 How TOR network works? Alice Bob √ M OR2 M M C2 C3 OR1 C1 C2 M OR3 C3 Port A circuit is built incrementally one hop by one hop Onion-like encryption Alice negotiates an AES key with each router Messages are divided into equal sized cells Each router knows only its predecessor and successor Only the Exit router (OR3) can see the message, however it does not know where the message is from 10 How TOR network works? Cells Traffic passes along these connections in fixed-size cells Each cell is 512 bytes Header circuit identifier (circID) a command to do with the cell's payload. Payload Encrypted data 11 Decryption in TOR Decryption of an Onion Tor circuit 4-3-5 OR-4 decrypts layer E[4u] Finds next OR ip address OR-3 decrypts layer E[3u] Finds next OR ip address OR-5 decrypts layer E[5u] Finds targets ip address Decrypted the data sends to target 12 Encryption in TOR 13 TOR Users Normal People Journalists and Audiences Law Enforcement Users Activists and Whistle-blowers Business Executives Cyber criminals 14 Dangers of using Tor Network Packet sniffing Exit node sends Full Plain text request to the target Running an exit node is dangerous Anyone using TOR network is on the NSA watch list under the XKEYSCORE program "The more you hide the more somebody wants to know why." 15 Conclusion researches in last 30yrs has significance process towards enabling anonymous communications on internet Tor becomes most widely used anonymous network with its speed Tor supports mutual anonymity Tor resists local adversary effectively Tor anonymizes TCP streams, providing a high-throughput and low- latency 16 References https://www.torproject.org/ https://svn.torproject.org/svn/projects/design-paper/tor-design.html 17 Q&A 18 ThankYou