<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://upload.wikimedia.org/wikipedia/commons/thumb/1/15/Tor-logo-2011-flat.svg/306px-Tor-logo-2011-flat.svg.png" alt="Tor logo" style="width: 306px; display: block; margin: 0 auto;" title="Tor logo" caption="false" data-constrained="true" width="306"> <p>In the past week, we decided to enhance the protection we offer via our <strong style="color: #545454; font-family: sans-serif; font-size: 12.1612px; background-color: transparent;">Anonymous Networks</strong><span style="color: #545454; font-family: sans-serif; font-size: 12.1612px; background-color: transparent;"> target, and discussed the <a href="https://blog.threatstop.com/vpn-and-tor-traffic-to-bypass-corporate-security" target="_blank">use of VPN</a></span>&nbsp;and Tor to bypass network security<span style="color: #545454; font-family: sans-serif; font-size: 12.1612px; background-color: transparent;">. Up until today, we primarily only blocked Tor exit nodes. However, we decided that this target should not only block Exit nodes, but also Guard and Middle relays. Here, we explain how TOR works and what changes were made to the target.</span></p> <!--more--> <p><span style="font-size: 14px; font-weight: bold; background-color: transparent; color: #595a5a;">So, What's Tor Anyway?</span></p> <p>Tor (an acronym derived from the original software project name – “The Onion Router”) is a network based on volunteer operated servers. Tor uses this network to create virtual tunnels through its relays in order to obfuscate the connection between a client and server. This method of connection allows the user to enjoy virtual anonymity as the data travels through different relays, without revealing the original user. The endpoint site thinks the request came from the Tor exit node, and the client thinks the returned data came from the Tor Guard Relay.</p> <h2><span style="font-size: 14px;">Ok, So How Does It Work?</span></h2> <p>In order to understand Tor, we need to understand relays (also called nodes). Tor uses an array of relays to safeguard the anonymity of the user. As a simplified explanation of the process demonstrated in (Figure 1):</p> <img src="http://info.threatstop.com/hubfs/diagram.png" alt="Figure 1 - Tor Network" title="Figure 1 - Tor Network" caption="false" data-constrained="true" style="width: 454px; display: block; margin-left: auto; margin-right: auto;" width="454"> <p><span style="font-size: 12.1612px; background-color: transparent;">Let’s assume a user is using the Tor network to send data. The user sends that data to a relay called the </span><strong style="font-size: 12.1612px; background-color: transparent;">Guard Relay</strong><span style="font-size: 12.1612px; background-color: transparent;"> (or, Entry Node). These relays are the steppingstone in to the Tor network. The relay peels the outer layer of encryption and forwards the packet without itself knowing if it received the data from the origin. (Or from just another relay in the chain) The second relay to receive the data is called a </span><strong style="font-size: 12.1612px; background-color: transparent;">Middle Relay,</strong><span style="font-size: 12.1612px; background-color: transparent;"> which again, peels the outer layer and sends the data to the next relay. This brings us to the final step, the </span><strong style="font-size: 12.1612px; background-color: transparent;">Exit Relay.</strong><span style="font-size: 12.1612px; background-color: transparent;"> (or, Exit Node) The final relay peels the last layer and sends the data to its intended receiver as if it is the original sender. However, it is important to understand the actual wrapping of the data is being done at the point of origin and is only peeled as it moves along the relay path.</span></p> <p><span style="font-size: 14px; font-weight: bold; background-color: transparent; color: #595a5a;">What's Being Blocked?</span></p> <p>As we mentioned, all encryption is done at the point of origin. This means that the origin must have a way to know how to contact these relays in the first place, thus comes <strong>The Consensus</strong>. Making a long story short, The Consensus is a list of all the Tor relays decided by and published by Tor’s own <strong>Directory Authorities</strong> (DAs – Figure 2). The DAs maintain the status of the entire Tor network at any given moment. This list is open to all and aids us in blocking Tor relays.</p> <img src="http://info.threatstop.com/hubfs/Figure%202.png" alt="Figure 2 - A list of Tor Directory Authorities (Source - https://atlas.torproject.org)" title="Figure 2 - A list of Tor Directory Authorities (Source - https://atlas.torproject.org)" caption="false" data-constrained="true" style="width: 454px; display: block; margin-left: auto; margin-right: auto;" width="454"> <h2><span style="font-size: 14px;">So, All of Tor is Blocked Now?</span></h2> <p>Well, no, the key word here is: <strong>Bridges</strong>. Bridges are in fact unpublished Guard Relays and they exist exactly for that purpose, to always allow a way to connect to the Tor network. (and in cases, of oppressive regimes, this is a good thing) A Bridge allows a user to connect to the Tor network, even if all Relays are blocked. Bridges are maintained by one of the 10 DAs and can be acquired by using either email or the official Tor Bridge website.</p> <p>For more information on ThreatSTOP or to try us out for a free trial, visit us <a href="https://www.threatstop.com/index.php?page=index&amp;action=trial" target="_blank">here</a>.</p></span>