Top Banner
SkypeMorph: Protocol Obfuscation for Tor Bridges Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani. Ian Goldberg Presented by Ganbi
17

SkypeMorph : Protocol Obfuscation for Tor Bridges

Feb 23, 2016

Download

Documents

Amara

SkypeMorph : Protocol Obfuscation for Tor Bridges. Hooman Mohajeri Moghaddam  Baiyu Li  Mohammad Derakhshani .  Ian Goldberg Presented by Ganbi. Outline. Overview Problem Solution Questions. Anonymity. Is it Important? People’s lives depend on it - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SkypeMorph : Protocol Obfuscation for Tor Bridges

SkypeMorph: Protocol Obfuscation for Tor

Bridges

Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani. Ian Goldberg

Presented by Ganbi

Page 2: SkypeMorph : Protocol Obfuscation for Tor Bridges

Outline1.Overview2.Problem 3.Solution4.Questions

Page 3: SkypeMorph : Protocol Obfuscation for Tor Bridges

AnonymityIs it Important?

People’s lives depend on itAuthoritative Government vs. Activist GroupsSyria, Egypt, China

Answer: Tor

Page 4: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor Overview

Page 5: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor Overview

Page 6: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor Overview

Page 7: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor ProblemThe public list of Tor relay nodes can give away all the IP addresses. To fix, developers added “bridge”

Page 8: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor Problem

Page 9: SkypeMorph : Protocol Obfuscation for Tor Bridges

Tor ProblemBridge

Page 10: SkypeMorph : Protocol Obfuscation for Tor Bridges

4 Ways to get Bridge IPhttps://Bridges.torproject.org will tell you few based on your IP address and locationMail [email protected] social networkYou can set up your own and tell your target users directly

Page 11: SkypeMorph : Protocol Obfuscation for Tor Bridges

ProblemSlowly China was able to block most Bridges by probingDPI (deep packet inspection) is still possible

Page 12: SkypeMorph : Protocol Obfuscation for Tor Bridges

Solution/PaperPluggable transports SkypeMorph

Disguise the Tor packets to look like Skype traffic by using already existing Skype VoIP protocol and user authentication system.

Page 13: SkypeMorph : Protocol Obfuscation for Tor Bridges

SolutionBridge

Page 14: SkypeMorph : Protocol Obfuscation for Tor Bridges

AdvantagesAnyone can use, it’s free!Can transfer reasonable size of data = no bottleneckEncryption already built inIn order to stop Tor, they also have to stop legitimate Skype calls, which is highly unlikelyAnother big advantage: Harder to block bridges even after they are found

Page 15: SkypeMorph : Protocol Obfuscation for Tor Bridges

Two Methods

Page 16: SkypeMorph : Protocol Obfuscation for Tor Bridges

Two Methods

Page 17: SkypeMorph : Protocol Obfuscation for Tor Bridges

Works Cited Moghaddam, Li, Derakhshani, and Goldberg "SkypeMorph: Protocol Obfuscation for Tor Bridges" (n.d.): n. pag. Print.https://www.torproject.org/about/overview.html.en