How Do Tor Users Interact With Onion Services PDF
How Do Tor Users Interact With Onion Services PDF
Abstract messaging [4] and file sharing [15]. The Tor Project
currently does not have data on the number of onion
Onion services are anonymous network services that are service users, but Facebook reported in 2016 that more
exposed over the Tor network. In contrast to conventional than one million users logged into its onion service in one
Internet services, onion services are private, generally not month [20].
indexed by search engines, and use self-certifying domain Onion services differ from conventional web services
names that are long and difficult for humans to read. In in four ways; First, they can only be accessed over the Tor
this paper, we study how people perceive, understand, and network. Second, onion domains are hashes over their
use onion services based on data from 17 semi-structured public key, which make them difficult to remember. Third,
interviews and an online survey of 517 users. We find that the network path between client and the onion service is
users have an incomplete mental model of onion services, typically longer, increasing latency and thus reducing the
use these services for anonymity and have varying trust in performance of the service. Finally, onion services are
onion services in general. Users also have difficulty dis- private by default, meaning that users must discover these
covering and tracking onion sites and authenticating them. sites organically, rather than with a search engine.
Finally, users want technical improvements to onion ser- In this paper, we study how users cope with these id-
vices and better information on how to use them. Our iosyncrasies, by exploring the following questions:
findings suggest various improvements for the security
and usability of Tor onion services, including ways to au- • What are users’ mental models of onion services?
tomatically detect phishing of onion services, more clear • How do users use and manage onion services?
security indicators, and ways to manage onion domain • What are the challenges of using onion services?
names that are difficult to remember.
Because onion services depend on the Tor Browser and
the underlying Tor network to exchange traffic, some of
1 Introduction our study also explored users’ mental models of Tor itself,
but this topic is not the focus of our paper.
The Tor Project’s onion services provide a popular way To answer these questions, we employed a mixed-
of running an anonymous network service. In contrast methods approach. First, we conducted exploratory inter-
to anonymity for clients (e.g., obfuscating a client IP ad- views with Tor and onion service users to guide the de-
dress using a virtual private network), Tor onion services sign of an online survey. We then conducted a large-scale
provide anonymity for servers, allowing a web server to online survey that included questions on Tor Browser,
obfuscate its network location (specifically, its IP address). onion service usage and operation, onion site phishing,
An operator of a web service may need to anonymize the and users’ general expectations of privacy. Next, we con-
location of a web service to escape harassment, speak out ducted follow-up interviews to further explore the topics
against power, or voice dissenting opinions. and themes that we discovered in the exploratory inter-
Onion services were originally developed in 2004 and views and survey. We complemented this qualitative data
have recently seen growing numbers of both servers and with an analysis of “leaked” DNS lookups to onion do-
users. As of June 2018, The Tor Project’s statistics count mains, as seen from a DNS root server; this data gave
more than 100,000 onion services each day, collectively us insights into actual usage patterns and allowed us to
serving traffic at a rate of nearly 1 Gbps. In addition to corroborate some of the findings from the interviews and
web sites, onion services include metadata-free instant surveys.
onion-services/pdf/survey-questions.pdf. https://reddit.com/r/samplesize/.
Table 2: The distribution over gender, age, education, and domain knowledge of the survey respondents. Providing demographic
information was optional, so we lack data for some respondents.
Curiosity 23.4
De-anonymization
NAT Traversal 21.66
Anonymity 17.98
Denial of Service
Automatic Creation 10.83
Other 8.7
Phishing
No Response 60.73
Figure 6: Reasons for running onion services. Figure 7: Concerns of onion service operators about attacks.
to a virtual private network and two used them to make using onion services for work, such as to help Internet
their website as private and personal as they could. users upload leaked documents to their whistleblower
Exploring the dark web. 27% of our survey respondents website anonymously. In another example, P5 used onion
and two interviewees wanted to find out more about the services in the academic peer review process to allow
dark web and onion domain content (3/517) as reasons to authors to submit source code or supplementary material
use onion services. Two interviewees used onion services anonymously: “If one of the other reviewers connects
for fun and social reasons—to “toy around” (P7) and to our university site, and we have some sort of tracking
also, as a way of spending time with friends, as well as to information on there, we would be deanonymizing the re-
“show off” around them by using a technology unfamiliar viewer. We put it on a Tor hidden service to make sure that
to most users. Interestingly, 19% of survey respondents the reviewer remains blind in academic review process.”
said that they use onion services for no particular reason Phishing concerns. We inquired how concerned the sur-
but have clicked on onion links occasionally. vey respondents were about three potential attacks on
their own onion services: (i) somebody setting up a phish-
5.1.3 Onion sites operated for various reasons ing site for the operator’s site, (ii) a denial-of-service
attack, and (iii) a deanonymization attack. According
Setting up an onion service. 39% of survey respondents to the results, shown in Figure 7, less than 8% of our
had set up an onion service at some point. Of the re- survey respondents who operated an onion service were
spondents who had set up onion services of their own at least somewhat concerned about all of these attacks.
(266/517), 31% had run their onion service for private use Only a small percentage, 15%, claimed to be extremely
while 21% had run them for the public. Figure 6 gives concerned about somebody deanonymizing their onion
an overview of the reasons our respondents have for run- service, 10% were extremely concerned about an onion
ning onion services. For instance, the majority of those site being taken offline, and only 9% were concerned
with onion services used them for end-to-end security, about an onion site being impersonated for phishing pur-
curiosity, or NAT traversal. Only 18% survey respondents poses. Indeed, in the open-ended responses, we noted that
had set up onion services for anonymity, such as to pro- several respondents lamented the difficulty of protecting
tect their visitors and provide security on their sites. In onion services from application-layer deanonymization
the open-ended responses, eleven survey respondents set attacks. Matic et al. demonstrated some of these attacks
up onion services because then their websites could be in 2015 [17].
accessed from anywhere in the world, and seven survey
respondents set up an onion service simply to test and 5.1.4 Varying trust in Tor and onion services
learn how they work. Another two survey participants
ran onion mirror sites to their personal websites, and at Our survey asked how safe our respondents feel when
least one had an onion service as a backup website in using Tor Browser and onion services, respectively. Fig-
case he lost control over his personal domain. Finally, at ure 8 shows that onion services were actually perceived
least two survey respondents set up onion for business as less safe than Tor browser. 85% of survey respondents
purposes, work requirements, or to add valuable content feel at least somewhat safe or very safe using Tor Browser
to the onion community. In a similar vein, at least two as compared to only 66% of onion service users.
interviewees spoke about setting up onion services or Reasons for trust. Survey responses indicated that par-
7 Conclusion
Onion services resemble the 1990s web: Pages load
Figure 13: A click on the onion icon reveals the Tor relays that slowly, user interfaces are clumsy, and search engines
constitute the circuit that was used to fetch the current page. As are inadequate. Users appreciate the extra security, pri-
of February 2018, the user interface is subject to a redesign [2]. vacy, and NAT punching properties of onion services,
which gives rise to a variety of use cases. Yet, users are
(Felt et al. found the subtleties that one must consider confronted with a variety of privacy, security and usability
when designing similar security indicators [8].) concerns that should be addressed in future generations of
The Tor Browser’s circuit display interface is also being onion services. For example, users are concerned about
redesigned (see Figure 13) [2]. As with an onion service the susceptibility of onion domains to phishing attacks,
indicator, an evaluation of the circuit display could reveal and the onion domains that are leaked to the public In-
user misunderstandings that may improve perceptions of ternet illustrate that this threat is real—and unaddressed.
and trust in onion services. For example, we found that Users have limited ways of discovering the existence of
some users are not familiar with the concept of guard onion services, let alone navigating to them.
relays and incorrectly expect each relay in their circuit to A range of design improvements, from better discovery
change, which suggests the need for an improved inter- mechanisms to automatic “upgrading” to a correspond-
face. Users also found it difficult to verify the authenticity ing onion service when it is available are initial steps to
of an onion site; while certificates do help, many sites still improve usability. Some of these desired features have
do not have them, and some may never have them. clear analogs in the public Internet, such as the padlock
Automatic detection of phishing onion domains. Our icon as a security indicator for HTTPS, and HTTP Strict
findings that some onion domains in the root DNS data Transport Security (HSTS) to automatically upgrade an
have small edit distance to popular onion domains sug- HTTP connection to HTTPS. We expect that many of the
gests that users may fall victim typos to phishing attacks; usability design lessons from the public Internet may in
on the other hand, because the number of popular onion some cases also apply to onion services.
domains is still relatively small and (through our analysis
and previous work [18, 33]) relatively well-known, the Acknowledgments
Tor Browser could raise an alert when the user attempts
to access an onion domain that has a small edit distance This research was supported by the National Science
to a popular onion domain. Foundation Awards CNS-1540066, CNS-1602399, and
Opt-in publishing of onion sites. Our participants often CNS-1664786. We thank George Kadianakis for helpful
wanted more services to be available as onion services feedback on our survey questions, Katherine Haenschen
and did not often know if an onion service for a popular for helping us improve our method, Mark Martinez for
website existed. Participants found it difficult to discover conducting interviews, Stephanie Whited for helping us
new onion services, which suggests the need for better disseminate our survey, and Antonela Debiasi for inform-
ways to find active onion services. While search engines ing us about current user experience efforts around the
and curated lists do exist, they do not generally allow Tor Browser. We thank Roya Ensafi, Will Scott, Jens
users to locate an onion service of interest without also Kubiziel, and Vasilis Ververis for pre-testing our survey,
stumbling upon unwanted content. One possibility is an and USC’s Information Sciences Institute for access to
opt-in public log, whereby users can learn about new the DNS B root data. We also thank the Tor community
onion domains as they are added. Many participants for helpful feedback, for volunteering for our interviews,
also expressed interest in a browser feature that could and for taking our survey.
automatically “upgrade” from a regular web site to its
corresponding onion service. (The Tor Project is currently References
investigating this problem space [13].)
[1] I. Bagueros. Communicating security expectations for .onion:
Privacy-preserving onion bookmarking. Participants what to say about different padlock states for .onion services.
found it difficult to track and save onion links; they often https://bugs.torproject.org/23247.
[18] A. Mohaisen and K. Ren. Leakage of .onion at the DNS Root: [37] P. Winter. Take part in a study to help improve
Measurements, Causes, and Countermeasures. IEEE/ACM Trans- onion services. https://blog.torproject.org/
actions on Networking, 25(5):3059–3072, 2017. take-part-study-help-improve-onion-services.
[19] C. Monteiro. Intercepting drug deals, charity, and [38] P. Winter, R. Ensafi, K. Loesing, and N. Feamster. Identifying
onionland, Oct. 2016. https://pirate.london/ and characterizing Sybils in the Tor network. In USENIX Secu-
intercepting-drug-deals-charity-and-onionland-a2f9bb306b04. rity. USENIX, 2016. https://nymity.ch/sybilhunting/pdf/
[20] A. Muffett. 1 million people use Facebook over Tor, Apr. 2016. sybilhunting-sec16.pdf.
https://www.facebook.com/notes/facebook-over-tor/
1-million-people-use-facebook-over-tor/
865624066877648/.