6.033 | Spring 2018 | Undergraduate

Computer System Engineering

Week 14: Security Part IV

Lecture 25: Tor

Lecture 25 Outline

  1. Introduction
  2. Cryptography Review
  3. Tor
  4. Attacks on Tor
  5. Performance
  6. Summary

Lecture Slides

Reading

  • [No readings]

Recitation 25: Meltdown

Lecture 26: Policy vs. Mechanism

Lecture Slides

Reading

Recitation 26: Trusting Trust

END OF CLASSES

Quiz 2

Quiz 2 will last two hours. The quiz will cover all the material starting from Lecture 14 up to and including Recitation 25 (Meltdown). We will not explicitly test you on any material from the last lecture and recitation (L26, R26). Note, though, that much of the content during those sessions will tie together concepts from the rest of the class, which will be useful on Quiz 2.

The quiz will be “open book.” That means you can bring along any printed or written materials that you think might be useful. Calculators are allowed, though typically not necessary. You may also bring a laptop to view, e.g., PDF versions of papers and notes, but you may not connect to any network; make sure you download the papers to your laptop before the quiz. Charge your laptops before you come; we cannot guarantee outlet availability.

Disclaimer: This is part of the security section in 6.033. Only use the information you learn in this portion of the class to secure your own systems, not to attack others.

  1. Introduction 
    • We’ve covered how to provide confidentiality, integrity, and authenticity.
    • Today we’re talking about anonymity.
    • Focus: Tor and Bitcoin.
      • Tor: Network for users to remain anonymous.
      • Bitcoin: Digitial currency system, which (possibly) provides anonymity.
      • Both deal with interesting technical problems.
      • Both solve problems using things we’ve taught you (public keys, signatures, etc.).
      • Very popular as of late.
    • You’ll see some threat models we haven’t considered yet.
  2. Crypto review 
    • Two ways to encrypt data:
      • Symmetric-key cryptography:
        • Alice and Bob share a key k, use it to encrypt and decrypt. k is secret, known only to Alice and Bob.
        • Key-exchange is an issue, we typically use Diffie-Hellman key exchange (L22).
        • Generally very fast.
      • Public-key cryptography:
        • Alice and Bob each have their own key pair: (Secret key, public key).
        • Alice’s secret key is known ONLY to her; Bob’s secret key is known ONLY to him. Public keys are known to everyone.
        • To encrypt a message to Alice, Bob uses her public key. She decrypts it with her secret key.
        • Aside: You saw public/secret keys used for signatures, where signing was done with the *secret* key and verification with the public one.
          • Mathematically, signature keys have to be constructed different than encryption keys, but that’s out of scope.
        • Everyone can do an action using the public key, but only the owner of the corresponding secret key can do the reverse action.
      • In practice: Use public-key cryptography to exchange an initial secret, which is used to generate a symmetric key, which is used to encrypt the rest of the conversation.
        • Happens in TLS.
  3. Tor 
    • Goal: Hide some information from a network adversary.
    • Secure channel model: Encrypt data, so packets look like: 
      Alice —- [to:bob|from:alice|XXXXXXXXX ] —> Bob 
    • Adversaries still know that Alice and Bob are communicating, even in this data (because we can’t encrypt packet headers). Concerning if, e.g., Alice is communicating with a sensitive website.
    • Tor will provide anonymity for Alice: Only she will know that she’s communicating with a particular server. The server won’t even know that Alice is talking to it.
    • Starting idea: Proxy server. 
      • Alice sends data to proxy server. Header shows “To:Proxy|From:Alice.”
      • Proxy receives packet, rewrites header, sends packet to server.
        • Header: “To:Server|From:Proxy.”
        • Traffic back from server goes to proxy, who sends it back to Alice (proxy keeps some state to do this).
      • Adversary between Alice and proxy only knows that Alice communicated with proxy; Adversary on network between proxy and server only knows that proxy communicated with server.
      • Problem: Proxy knows that Alice is communicating with server.
    • Better idea: A network of N proxies. 
      • Alice chooses three (or more) proxies. Say P1, P2, P3.
      • Traffic to server, S, goes
      • Nodes on this path—“circuit”, in Tor parlance—set up the following state. Here, the “circuit ID” is 5.
      • State at each node only gives previous and next hop. Allows nodes to send traffic in forward and reverse directions.
      • Each node in circuit makes changes to packet header. 
      • Problem: Adversary that can observe network between A and P1 and between P3 and S will see the same packet data (even if it’s encrypted, it didn’t change), and know that A is talking to S.
    • Tor: Network of proxies + encryption. 
      • Each proxy gets its own keypair.
      • Alice encrypts here data with all three keypairs.
      • Each proxy strips off a layer of encryption:
      • Layers are stripped off like onions. Tor = The Onion Router.
        • Tor’s encryption method is a bit different, but this is the basic idea.
  4. Attacks on Tor 
    • Most popular attack is a traffic-correlation attack.
      • If the adversary can observe traffic into the entry node (P1) and out of the exit node (P3), they will see different data in the packets, but some things will remain preserved: Packet sizes (roughly), timing (roughly).
      • Can use that info to correlate traffic, infer that A is communicating with S.
      • Tor does not defend against this, but does have users use only a few entry nodes, in the hopes that they are trusted.
        • Their argument is that having your traffic identified some of the time is as bad as having it identified all of the time. This approach means there is a nonzero chance that it will *never* be identified, unlike a set-up where users choose a new random entry node each time.
      • A few other attacks exist, mostly due to details of Tor that we didn’t cover in 6.033.
      • The Tor developers are very up front about what it protects against.
  5. Performance 
    • Tor can be slow at times, and latency is high.
      • Partly inevitable: Traffic bounces all around the globe, plus involves decryption at every step.
      • Partly due to some implementation details that are (possibly) fixable.
  6. Summary 
    • Technical problems you saw today and last lecture:
      • How to design a network where no one, except the sender, keeps state linking sender and receiver and yet a packet can be sent from A to S.
      • How to create a decentralized digital currency, and in particular, how to create a secure distributed public log.
    • These two technologies can get a bad rap, because they are often used on the “underground web.” Unfair! They solve cool problems in networking/distributed systems.
    • Moreover, they give you a sense of how secure you are online. Did you know, e.g., that even if you encrypt your packets, adversaries can get all sorts of meta-information? Perhaps we live in a world where our government collects that information? Do we want them to know who we’re talking to regardless of whether we’re doing something illegal?
A --- \[from:A |to:P1|cir:5|XXX\] -->
P1 -- \[from:P1|to:P2|cir:5|XXX\] -->
P2 -- \[from:P2|to:P3|cir:5|XXX\] -->
P3 -- \[from:P3|to:S |XXX\] --------> S

For this recitation, you’ll be reading “Meltdown (PDF)” by Moritz Lipp, Michael Schwarz, et al. Meltdown, along with Spectre, is a security vulnerability that was discovered early this year, which affects all modern Intel processors.

To help as you read:

  • Sections 2 and 3 give a very good overview of the necessary background and a toy example to help you understand the basic attack.
  • Sections 4 and 5 extend that toy example, explaining how Meltdown was actually implemented.
  • Section 6 evaluates the attack, explaining what systems are vulnerable and how well the attack performs.
  • Sections 7 and 8 discuss countermeasures and some of the consequences of Meltdown.

As you read, think about the following:

  • How does Meltdown differ from the other attacks we’ve seen? In particular, how does it compare to the memory corruption attacks in the previous recitation?
  • Think about Meltdown in the context of the guard model. Is there a guard in place here? If so, how is it being subverted?
  • The paper (Section 6.4) mentions that ARM and AMD CPUs do not appear susceptible to Meltdown, and posit that it could be that the current implementation of Meltdown is too slow. Why does the speed of the Meltdown code matter here?

Questions for Recitation

Think about the following before recitation. You do not need to turn anything in since it’s the last week of classes. (Participation during this recitation does still count towards your grade.)

  • What is the Meltdown attack?
  • How does it work?
  • Why is this attack possible? (Or an alternative question, why doesn’t Intel simply disable out-of-order execution on its processors?)

As always, there are multiple correct answers for each of these questions.

Read “Reflections on Trusting Trust (PDF)” by Ken Thompson. (Note: In this version, figure 2.2 should be labeled 2.1 and vice versa). This is one of our shortest readings—only three pages—but do not be deceived by its brevity. The paper is actually a transcript of Ken Thompson’s Turing Award acceptance speech.

The paper emphasizes how difficult it is to be sure that you know what your software actually does. One way to avoid treacherous software would be to write all your software yourself. Although this approach would in principle solve the problem, it is overwhelmingly impractical. One has no choice but to rely on, and thus trust, software from other sources.

Questions for Recitation

Think about the following before recitation. You do not need to turn anything in since it’s the last week of classes. (Participation during this recitation does still count towards your grade.)

  • What does Thompson’s hack do?
  • How does the hack work?
  • Why does it work? (I.e., what exactly causes the hack to go undetected?)

As always, there are multiple correct answers for each of these questions.

Course Info

Instructor
As Taught In
Spring 2018
Learning Resource Types
Lecture Notes
Written Assignments
Projects with Examples
Instructor Insights