Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Sauteed Onions: Transparent Associations from Domain Names to Onion Addresses
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0003-0840-5072
U.S. Naval Research Laboratory, USA.
Verkligen Data AB, Stockholm.
Independent, USA.
2022 (English)In: WPES'22: Proceedings of the 21st Workshop on Privacy in the Electronic Society, Association for Computing Machinery (ACM), 2022, Vol. November 2022, p. 35-40Conference paper, Published paper (Refereed)
Abstract [en]

Onion addresses offer valuable features such as lookup and routing security, self-authenticated connections, and censorship resistance. Therefore, many websites are also available as onionsites in Tor. The way registered domains and onion addresses are associated is however a weak link. We introduce sauteed onions, transparent associations from domain names to onion addresses. Our approach relies on TLS certificates to establish onion associations. It is much like today's onion location which relies on Certificate Authorities (CAs) due to its HTTPS requirement, but has the added benefit of becoming public for everyone to see in Certificate Transparency (CT) logs. We propose and prototype two uses of sauteed onions: certificate-based onion location and search engines that use CT logs as the underlying database. The achieved goals are consistency of available onion associations, which mitigates attacks where users are partitioned depending on which onion addresses they are given, forward censorship-resistance after a TLS site has been configured once, and improved third-party discovery of onion associations, which requires less trust while easily scaling to all onionsites that opt-in.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022. Vol. November 2022, p. 35-40
Keywords [en]
certificate transparency, onion services, tls certificates, web pki, HTTP, Network security, Search engines, Seebeck effect, Certificate authority, Certificate-based, Domain names, Lookups, Onion service, Routing security, Tls certificate, Weakest links, Transparency
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-92773DOI: 10.1145/3559613.3563208Scopus ID: 2-s2.0-85143256217ISBN: 978-1-4503-9873-2 OAI: oai:DiVA.org:kau-92773DiVA, id: diva2:1722436
Conference
21st Workshop on Privacy in the Electronic Society, Los Angeles, USA, November 7-11, 2022.
Funder
Swedish Foundation for Strategic ResearchAvailable from: 2022-12-29 Created: 2022-12-29 Last updated: 2023-04-18Bibliographically approved
In thesis
1. On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users
Open this publication in new window or tab >>On Certificate Transparency Verification and Unlinkability of Websites Visited by Tor Users
2023 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Certificate Transparency is an ecosystem of logs, monitors, and auditors that hold certificate authorities accountable while issuing certificates. We show how the amount of trust that TLS clients and domain owners need to place in Certificate Transparency can be reduced, both in the context of existing gradual deployments and the largely unexplored area of Tor. Our contributions include improved third-party monitoring, a gossip protocol plugging into Certificate Transparency over DNS, an incrementally deployable gossip-audit model tailored for Tor Browser, and using certificates with onion addresses. The methods used range from proof sketches to Internet measurements and prototype evaluations. An essential part of our evaluation in Tor is to assess how the protocols used during website visits—such as requesting an inclusion proof from a Certificate Transparency log—affect unlinkability between senders and receivers. We find that most false positives in website fingerprinting attacks can be eliminated for all but the most frequently visited sites. This is because the destination anonymity set can be reduced due to how Internet protocols work: communication is observable and often involves third-party interactions. Some of the used protocols can further be subject to side-channel analysis. For example, we show that remote (timeless) timing attacks against Tor’s DNS cache reliably reveal the timing of past exit traffic. The severity and practicality of our extension to website fingerprinting pose threats to the anonymity provided by Tor. We conclude that access to a so-called website oracle should be an assumed attacker capability when evaluating website fingerprinting defenses.

Abstract [sv]

Projektet Certificate Transparency är ett ekosystem av loggar, övervakare och granskare som håller certifikatutfärdare till svars för utfärdade webbcertifikat. Vi visar hur säkerheten kan höjas i ekosystemet för både domäninnehavare och TLS-klienter i nuvarande system samt som del av anonymitetsnätverket Tor. Bland våra större bidrag är förbättrad övervakning av loggarna, ett skvallerprotokollsom integrerats med DNS, ett skvaller- och granskningsprotokoll som utformats specifikt för Tors webbläsare och ett förslag på hur domännamn med adresser i Tor kan bli mer tillgängliga. De metoder som använts varierar från säkerhetsbevis till internetmätningar och utvärderingar av forskningsprototyper. En viktig del av vår utvärdering i Tor är att avgöra hur protokoll som används av webbläsare påverkar möjligheten att koppla ihop användare med besökta webbplatser. Detta inkluderar existerande protokoll samt nya tillägg för att verifiera om webbplatsers certifikat är transparensloggade. Våra resultat visar att i många fall kan falska positiva utslag filtreras bort vid mönsterigenkänning av Tor-användares krypterade trafik (eng: website fingerprinting). Orsaken är att besök till de flesta webbplatser kan uteslutas till följd av hur internetprotokoll fungerar: kommunikation är observerbar och involverar ofta interaktioner med tredjeparter. Vissa protokoll har dessutom sidokanaler som kan analyseras. Vi visar exempelvis att Tors DNS-cache kan undersökas med olika varianter av tidtagningsattacker. Dessa attacker är enkla att utföra över internet och avslöjar vilka domännamn som slagits upp vid angivna tidpunkter. De förbättrade mönsterigenkänningsattackerna mot webbplatser är realistiska och hotar därför Tors anonymitet. Vår slutsats är att framtida försvar bör utvärderas utifrån att angripare har tillgång till ett så kallat webbplatsorakel.

Place, publisher, year, edition, pages
Karlstad: Karlstads universitet, 2023. p. 29
Series
Karlstad University Studies, ISSN 1403-8099 ; 2023:15
Keywords
Auditing, Certificate Transparency, DNS, Gossip, Side-Channels, Timing Attacks, Tor, Tor Browser, Website Fingerprinting, Website Oracles, Granskning, Certificate Transparency, DNS, Skvaller, Sidokanaler, Tidtagningsattacker, Tor, Torswebbläsare, Mönsterigenkänning, Webbplatsorakel
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-94343 (URN)978-91-7867-372-8 (ISBN)978-91-7867-373-5 (ISBN)
Public defence
2023-06-12, Eva Eriksson, 21A 342, Karlstad University, Karlstad, 10:15 (English)
Opponent
Supervisors
Projects
HITS (4707), SURPRISE (SSF, RIT17-0005)
Available from: 2023-05-22 Created: 2023-04-18 Last updated: 2023-05-22Bibliographically approved

Open Access in DiVA

fulltext(970 kB)61 downloads
File information
File name FULLTEXT01.pdfFile size 970 kBChecksum SHA-512
20788c9bf91df03e6bd12080850967d6b2b76c7a0f08dae8555957c2bb2da724f0c3e41c8854938612e1e1fc3a7a9b90717b2bb21a97f70d5821e66f61af4852
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Dahlberg, Rasmus

Search in DiVA

By author/editor
Dahlberg, Rasmus
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 61 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 647 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf