340 likes | 600 Views
TOR – THE ONION ROUTER. BY, Anish Shanmugasundaram And Yashwanth Sainath Jammi. Introduction to Tor. Tor is the second-generation onion router. Is a system intended to enable online anonymity. Allows people and groups to improve their privacy and security on the Internet.
E N D
TOR – THE ONION ROUTER BY, AnishShanmugasundaram And YashwanthSainathJammi
Introduction to Tor • Tor is the second-generation onion router. • Is a system intended to enable online anonymity. • Allows people and groups to improve their privacy and security on the Internet. • Allows people to visit websites without being tracked or monitored. • It enables to connect to those internet services blocked by their local Internet providers.
Design Goals • Deployability • Usability • Flexibility • Simple Design • Ensure perfect forward secrecy.
Design • Overlay network on the user level. • Onion Routers route traffic. • Onion Proxy fetches directories and creates circuits on the network. • It uses TCP. • Data is sent in fixed size (bytes) cells.
Limitations of Tor • Not secure against end-to-end attacks. • Tor does not try to conceal who is connected to the network. • Not P2P. • Not secure against end-to-end attacks. • No protocol normalization.
Hidden Services • Hidden services are accessed through pseudomain. • It provides anonymity to servers in the form of location-hidden services. • Design goals for location hidden services • Access Control: filtering incoming requests. • Robustness: maintain a long-term pseudonymous identity. • Smear-resistance: against socially disapproved acts. • Application transparency
Attacks • Active Attacks • Compromising Keys • Run a hostile OR • Passive Attacks • Observing user traffic patterns • Observing user content • End-to-end timing correlation • Attacks on the Directory Service • Destroy directory service • Subvert 1 or more directory servers • Attacks against rendezvous points • Make many introduction requests • Compromise a rendezvous point
Pros and Cons • Pros • Tor is simple and doesn’t involve complicated mechanisms. • It isvery easy to use and deploy. • It is transparent for applications on end hosts. • Cons • Poor end-to-end throughput. • Current directory distribution scheme is not scalable. • Tor uses fixed-size cell, which is not efficient for some applications like telnet, ssh.
References [1]:http://en.wikipedia.org/wiki/Tor_(anonymity_network) [2]:https://www.torproject.org/about/overview.html.en