[tor-dev] Proposal: End-to-end encrypted onion services for non-Tor clients
Donncha O'Cearbhaill
donncha at donncha.is
Mon Sep 14 16:12:23 UTC 2015
Hello all,
I have been thinking about ideas to make Tor hidden services more available and
secure for non-Tor users. Inline I've included a draft proposal which describes an end-to-end
encrypted Tor2Web-like system.
I'm really interested in hearing any suggestions, comments or criticism about this
proposal. In particular I'd like to know if the trust requirements for the entry proxies
and resolvers seem reasonable? Does this proposal make sense and is it something worth implementing?
Thank you to David Stainton and Leif Ryge for your feedback on this proposal.
Kind Regards,
Donncha
---
Filename: xxx-encrypted-onion-services-for-non-tor-clients.txt
Title: End-to-end encrypted onion services for non-Tor clients
Author: Donncha Ó Cearbhaill
Created: 22-Aug-2015
Status: Draft
1. Overview:
This proposal describes a system to allow non-Tor users to securely access
location-hidden services via a domain name chosen by the hidden service
operator.
2. Motivation:
Tor hidden services have typically been used to provide anonymity to both
services and clients. There are however use cases where a publisher or
content provider requires anonymity but their users do not. The publishers
typically would like their content to be available securely and to the
widest possible audience.
Tor2Web currently allows non-Tor users to access hidden services but it has
a number of limitations. Tor2Web deployments are limited due to requirement
to entrust Tor2Web service providers with users location information and the
content of their requests.
The onion subdomain based addressing in Tor2Web poses a usability issue and
can be unwieldy for users without providing any self-authenticating
properties. Tor2Web can be configured with a custom domain for an individual
hidden service but this requires manual configuration and additional
infrastructure.
Ideally non-Tor users should be able to access location-hidden services
under a standard domain name with end-to-end encryption from the client's
browser to the hidden service web server. The system should be decentralized
and it should not require the hidden service operator to run any clearnet
systems.
3. Proposal:
At a high level this proposal specifies a system of TCP entry proxies which
transparently proxy the TLS connections of non-Tor clients to a hidden
service. A client who requests a domain name such as https://myblog.com
should get connected to a hidden service endpoint which has a valid SSL
certificate for myblog.com.
3.1. Hidden Service configuration
A hidden service operator obtains a public domain name and a corresponding
CA signed SSL certificate. The operator configures the hidden service web
server with the SSL certificate for the external domain.
The domain name is pointed at an authoritative nameserver provider. The
operator should also set a TXT DNS record containing the onion address of
their hidden service.
3.2. Entry Proxy
Modern web browsers send a Server Name Indication (SNI) field in the initial
ClientHello of the TLS handshake. The entry proxy reads this field to
determine the clients destination domain. The proxy performs a DNS lookup at
that domain for a TXT record which specifies the corresponding onion address
for the provided domain.
The TLS entry proxy connects to the onion service via a Tor2Web-type circuit
and then begins transparently proxying TLS traffic between the clients
browser and the destination onion service.
3.3. Resolving Nameserver
The key component of this system is a DNS name server which can direct
clients to an online entry proxy via a round-robin type system. In a basic
solution the onion service operator could manually specify one or more entry
proxies in the A records for their domain on their existing authoritative
DNS provider.
In practice entry proxy churn would result in changing set of entry proxies.
The nameserver will need regularly update its set of online entry proxies an
remove proxies which are malfunctioning, malicious or otherwise unusable.
The resolver may run a scanner to check its known proxies or load a list
from an external service. Additionally the resolver should detect if an
entry proxy blacklists a domain for which it is responsible and avoid
routing clients to that entry proxy.
It is expected that independent service providers will run their own
domain->onion resolving nameserver in diverse jurisdictions as free or paid
services.
4. Implementation:
The entry proxy component could be implemented as part of the current Tor
relay code base. Integration directly within Tor would allow use of the
existing network consensus and bandwidth measurement systems to be used to
discover available entry proxies. It would also allow for malicious entry
proxies to be blacklisted.
Alternatively the entry proxy could be implemented in the existing Tor2Web
software or as a standalone software package. Implementing outside of Tor
would be faster and it would avoid the risk of losing Tor relay capacity as
a result of legal threats to the entry proxies.
The resolving nameserver is the most complicated component of this system.
The component will eventually require a DNS server, a management interface,
and a set of network monitoring tools.
5. Security and resiliency implications:
5.1. Availability Attacks:
Adversaries can attack the availability of a publicly-proxied hidden
service at a number of levels:
* Censorship or shutdown of entry proxy:
Attacks on individual entry proxies are mitigated by performing DNS
based round-robin between many online entry proxies. The Resolver system
should be able to quickly remove entry proxies which misbehave or which
go offline.
* Censorship or seizure of the hidden service public domain:
DNS based blocks are widely deployed for censorship and may be difficult
to avoid. Domain registrars can also be forced to suspend domain names.
Service operators should considering running their service under a TLD
which is less vulnerable to these type of coercive threats.
* Takedown of a nameserver provider:
Multiple resolving nameservers can be configure for each forwarded
domain. Using nameservers maintained by different providers can provide
resilience to attacks against a single nameserver provider.
5.2. Security Attacks:
Entry proxies and exit relays have a similar ability to monitor and
interfere with client traffic. This is greater risk of targeted
interference from entry proxies as they can also determine the client's
network location.
* Man-in-the-middle HTTP connections:
Entry proxies have the ability to man-in-the-middle HTTP connections.
Service operators should send HSTS header to force clients to
automatically use TLS for all future connections.
* TLS man-in-the-middle with CA-signed certificate
Some commercial CA cert providers allow for domain ownership to be
validated by providing a file over HTTP at the domain. A malicious entry
proxy could successfully obtain a CA-signed certificate from one of
these certificate authorities.
Service operators can minimize their exposure to this type of attack by
using HPKP headers to limit the set of valid certificate authorities for
their domain.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 630 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20150914/16d42924/attachment.sig>
More information about the tor-dev
mailing list