Professional Documents
Culture Documents
Bruce Maggs Relying On Materials From
Bruce Maggs Relying On Materials From
Bruce Maggs
(directory server)
3
How Tor Works
4
5
Encryption Keys in TOR
• Each relay has a long-term ``identity’’
public/private key pair used to sign TLS
certificates (public keys signed by directory)
• Medium-term (one week) public/private ``onion’’
keys are used to decrypt requests to extend
circuits – so first node can’t spoof the whole
path. These keys are deleted so that if relay is
compromised, old traffic can’t be decrypted.
• Short-term “connection” or “ephemeral” shared
private keys are used to encrypt connections.
6
How Tor Works
7
Bridge Relays (a.k.a. Bridges)
8
Solve a Captcha to get Bridge Address
9
10
Growth of Tor Network
11
Growth of Tor Network
12
Spike in Number of Users
13
Possible Explanation for Spike
• http://blog.fox-it.com/2013/09/05/large-
botnet-cause-of-recent-tor-network-
overload/
14
15
Tor Exit Nodes See Plaintext!
http://archive.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=all
16
Tor Browser
17
Tor Browser
18
19
Tor-Aware Web Servers
21
Establishing a Hidden Service
22
Finding a Hidden Service
23
Contacting a Hidden Service
24
Contacting a Hidden Service
25
Communicating with a Hidden Service
26
Using Tor as a SOCKS5 Proxy
27
Configure HexChat to use Proxy
28
Now Chatting through Tor
29
4
30