Anonymity Professor Patrick McDaniel CSE545 - Advanced Network - - PowerPoint PPT Presentation

anonymity
SMART_READER_LITE
LIVE PREVIEW

Anonymity Professor Patrick McDaniel CSE545 - Advanced Network - - PowerPoint PPT Presentation

Anonymity Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 CSE545 - Advanced Network Security - Professor McDaniel Page 1 Anonymity CSE545 - Advanced Network Security - Professor McDaniel Page 2 The Internet


slide-1
SLIDE 1

CSE545 - Advanced Network Security - Professor McDaniel Page

Anonymity

Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011

1

slide-2
SLIDE 2

CSE545 - Advanced Network Security - Professor McDaniel

Page

Anonymity

2

slide-3
SLIDE 3

CSE545 - Advanced Network Security - Professor McDaniel

Page

The Internet can’t be censored

“The Net treats censorship as damage and routes around it.”

  • John Gillmore

(2011 -- go ask Libya)

slide-4
SLIDE 4

CSE545 - Advanced Network Security - Professor McDaniel

Page

Actually, none of this is true

  • It is easy to adopt a pseudonym or a persona on the Internet, but it

is difficult to be truly anonymous

  • Identities can usually be revealed with cooperation of ISP

, local sys-admins, web logs, phone records, etc.

  • The Internet can put up a good fight against censorship, but in the

end there is still a lot of Internet censorship

  • Repressive governments and intellectual property lawyers have been pretty

successful at getting Internet content removed

  • Case in point, “the great firewall of China”
slide-5
SLIDE 5

CSE545 - Advanced Network Security - Professor McDaniel

Page

Why anonymity?

  • What about in the real world?
  • Do you want people to know which stores, movies, restaurants,

books you make use of?

  • Do you want everything you say to be associated with you

(forever)?

  • Are there activities that you would not like to share when

surfing the net?

  • With whom?
  • What about writings (e.g., blogging), new group postings, …

“McDaniel’s programming stupidity example”

slide-6
SLIDE 6

CSE545 - Advanced Network Security - Professor McDaniel

Page

Degrees of anonymity

Absolute privacy: adversary cannot observe communication Beyond suspicion: no user is more suspicious than any other Probable innocence: each user is more likely innocent than not Possible innocence: nontrivial probability that user is innocent Exposed (default on web): adversary learns responsible user Provably exposed: adversary can prove your actions to others

More Less

slide-7
SLIDE 7

CSE545 - Advanced Network Security - Professor McDaniel

Page

Software tools

  • Encryption tools – prevent
  • thers from listening in on

your communications

  • File encryption
  • Email encryption
  • Encrypted network

connections

  • Anonymity and

pseudonymity tools – prevent your actions from being linked to you

  • Anonymizing proxies
  • Mix Networks and similar web

anonymity tools

  • Anonymous email

nInformation and transparency tools – make informed choices about how your information will be used

«Identity management tools «P3P

nFilters

«Cookie cutters «Child protection software

nOther tools

«Computer “cleaners” «Privacy suites «Personal firewalls

slide-8
SLIDE 8

CSE545 - Advanced Network Security - Professor McDaniel

Page

User view ...

  • Problem Statement
  • I want to surf the Internet and view content.
  • … I am concerned that the Websites are going to track me …
  • … or the government or Insurance agency or some other
  • rganization is going to associate me with some community.
  • This is a reality: many users may be wary of freely surfing

sensitive content

  • Especially when societal stigma involved (e.g., looking for

information on AIDS)

  • Incognito (Chrome): disable caching, history, persistent

cookies, etc.

  • Does this lead to anonymous browsing?
slide-9
SLIDE 9

CSE545 - Advanced Network Security - Professor McDaniel

Page

Anonymous email

  • Anonymous remailers allow people to send email

anonymously

  • Similar to anonymous web proxies
  • Send mail to remailer, which strips out any identifying information

(very controversial)

  • Johan (Julf) Helsingius ~ Penet
  • Some can be chained and work like mixes

http://anon.efga.org/~rlist

slide-10
SLIDE 10

CSE545 - Advanced Network Security - Professor McDaniel

Page

Filters

  • Cookie Cutters
  • Block cookies, allow for more fine-grained cookie control, etc.
  • Some also filter ads, referrer header, and browser chatter
  • http://www.junkbusters.com/
  • Child Protection Software
  • Block the transmission of certain information via email, chat

rooms, or web forms when child is using computer

  • Limit who a child can email or chat with
  • http://www.getnetwise.org/
slide-11
SLIDE 11

CSE545 - Advanced Network Security - Professor McDaniel

Page

Filters (cont.)

  • Pop-up blockers
  • Filters more to reduce annoying, rather than protect privacy
  • Works in similar ways to cookie cutters
  • Built into newer browsers (Safari)
  • New

York Times - delay content adds

  • Web-Bug detectors (not filters)
  • Highlights invisible .gifs used to track user

http://www.bugnosis.org

slide-12
SLIDE 12

CSE545 - Advanced Network Security - Professor McDaniel

Page

Proxy solutions

  • Acts as a proxy for users
  • Hides information from end servers
  • Sees all web traffic
  • Adds ads to pages (free service; subscription service also

available) http://www.anonymizer.com

Anonymizer

Client Server

slide-13
SLIDE 13

CSE545 - Advanced Network Security - Professor McDaniel

Page

Proxy solutions

  • Acts as a proxy for users
  • Hides information from end servers
  • Sees all web traffic
  • Adds ads to pages (free service; subscription service also

available) http://www.anonymizer.com

Anonymizer

Request

Client Server

slide-14
SLIDE 14

CSE545 - Advanced Network Security - Professor McDaniel

Page

Proxy solutions

  • Acts as a proxy for users
  • Hides information from end servers
  • Sees all web traffic
  • Adds ads to pages (free service; subscription service also

available) http://www.anonymizer.com

Anonymizer

Request Request

Client Server

slide-15
SLIDE 15

CSE545 - Advanced Network Security - Professor McDaniel

Page

Proxy solutions

  • Acts as a proxy for users
  • Hides information from end servers
  • Sees all web traffic
  • Adds ads to pages (free service; subscription service also

available) http://www.anonymizer.com

Anonymizer

Request Request Reply

Client Server

slide-16
SLIDE 16

CSE545 - Advanced Network Security - Professor McDaniel

Page

Proxy solutions

  • Acts as a proxy for users
  • Hides information from end servers
  • Sees all web traffic
  • Adds ads to pages (free service; subscription service also

available) http://www.anonymizer.com

Anonymizer

Request Request Reply Reply

Client Server

slide-17
SLIDE 17

CSE545 - Advanced Network Security - Professor McDaniel

Page

Mixes [Chaum81]

  • Assume a fully connected

network of nodes

  • Peers want to communicate

with each but don’t want people to know that they are talking

  • Alternately: the sender might

not want the receiver to know who she is

  • Assumption: nobody can perform

traffic analysis

  • Suppose E wants to send to B

13

F D A C B E

slide-18
SLIDE 18
  • 1. E picks a random order of a subset of nodes in the graph. Arbitrarily, she

chooses FAC to send message m.

  • 2. E creates a message:

E(E(E(E(P|msg), K+

B)|B, k+ C)|C, k+ A)|A, k+ F )

where P is some random padding and sends it to F.

  • 3. F uses their private key to decrypt the message and recovers:

E(E(E(P|msg), K+

B)|B, k+ C)|C, k+ A)|A

F strips off the trailing A and sends the remainder to C

  • 4. Repeat until B receives E(P|msg), K+

B, which unwraps the message and

returns it.

CSE545 - Advanced Network Security - Professor McDaniel

Page

Simplified Mix

14

slide-19
SLIDE 19

CSE545 - Advanced Network Security - Professor McDaniel

Page

Simplified Mix

15

F D A C B E

E(E(E(E(P|msg), K+

B)|B, k+ C)|C, k+ A)|A, k+ F )

E(E(E(P|msg), K+

B)|B, k+ C)|C, k+ A)

E(E(P|msg), K+

B)|B, k+ C)

E(P|msg), K+

B)

slide-20
SLIDE 20
  • 1. Include a one time key ko and the following in the original message:

E(E(E(E(P|E), K+

E)|E, k+ D)|D, k+ A)|A, k+ F )|F, k0

  • 2. Encrypt the message to be returned, mr using ko, then send to F:

E(E(E(E(P|E), K+

E)|E, k+ D)|D, k+ A)|A, k+ F )|F, E(mr, ko)

  • 3. Now follow the reverse routing back to E.

This is an imperfect solution, can you guess why?

CSE545 - Advanced Network Security - Professor McDaniel

Page

(Simplified) Return Address??

16

slide-21
SLIDE 21

CSE545 - Advanced Network Security - Professor McDaniel

Page

Tor and Friends

  • Circuit-based version of mix-like routing.
  • They use things like SSL/TLS to secure peer communication
  • Build onion circuits that support anonymized communication.
  • Challenges:
  • Doing this fast
  • Ensure that traffic analysis is very hard
  • Prevent compromised notes from manipulating the mix to

expose the communicating parties

  • Do key security association management

17

slide-22
SLIDE 22

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

  • Users join a Crowd of other users
  • Web requests from the crowd cannot be linked to any

individual

  • Protection from
  • end servers
  • other crowd members
  • system administrators
  • eavesdroppers
  • First system to hide data shadow on the web without

trusting a central authority

slide-23
SLIDE 23

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-24
SLIDE 24

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-25
SLIDE 25

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-26
SLIDE 26

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-27
SLIDE 27

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-28
SLIDE 28

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-29
SLIDE 29

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

slide-30
SLIDE 30

CSE545 - Advanced Network Security - Professor McDaniel

Page

Crowds

1 2 6 3 5 4 3 5 1 6 2 4 Crowd members Web servers

1.initiator selects a jondo (‘John Doe’), which is another host in crowd 2.jondo either (a) forwards traffic to randomly selected next hop or (b) forwards requests to end server

slide-31
SLIDE 31

CSE545 - Advanced Network Security - Professor McDaniel

Page

Provider view ..

  • Problem Statement
  • I want to publish some content
  • … I am concerned that the Websites are going to track

me …

  • … or the government or Insurance company or some
  • ther organization is going to associate me with some

community.

  • Some countries are very serious about controlling

content on the Internet.

  • Software used to anonymously distribute information to

community (political dissident).

slide-32
SLIDE 32

CSE545 - Advanced Network Security - Professor McDaniel

Page

Anonymous censorship-resistant publishing

  • The printing press and the WWW can be powerful

revolutionary tools

  • Political dissent
  • Whistle blowing
  • Radical ideas
  • but those who seek to suppress revolutions have powerful

tools of their own

  • Stop publication
  • Destroy published materials
  • Prevent distribution
  • Intimidate or physically or financially harm author or publisher
slide-33
SLIDE 33

CSE545 - Advanced Network Security - Professor McDaniel

Page

Anonymity increases censorship- resistance

  • Reduces ability to force “voluntary” self-censorship
  • Allows some authors to have their work taken more

seriously

  • Reduces bias due to gender, race, ethnic background, social

position, etc.

  • Many historical examples of important anonymous

publications

  • In the Colonies during Revolutionary War when British law

prohibited writings suggesting overthrow of the government

  • Federalist papers
slide-34
SLIDE 34

CSE545 - Advanced Network Security - Professor McDaniel

Page

Publius design goals

  • Censorship resistant
  • Tamper evident
  • Source anonymous
  • Updateable
  • Deniable
  • Fault tolerant
  • Persistent
  • Extensible
  • Freely Available
slide-35
SLIDE 35

CSE545 - Advanced Network Security - Professor McDaniel

Page

Publius Overview

  • Publius Content – Static content (HTML, images, PDF, etc)
  • Publishers – Post Publius content
  • Servers – Host Publius content
  • Retrievers – Browse Publius content

Publishers Servers Retrievers

slide-36
SLIDE 36

CSE545 - Advanced Network Security - Professor McDaniel

Page

Publious

  • Generate secret key and use it to encrypt document
  • Use “secret splitting” to split key into n shares
  • This technique has special property that only k out of n shares are needed to put the

key back together

  • Publish encrypted document and 1 share on each of n servers
  • Generate special Publius URL that encodes the location of each share and encrypted

document – example: http://!publius!/1e6adsg673h0==hgj7889340==345lsafdfg

25 Content Encrypted Content random key K

Encryption

key share 1 key share 2 key share 3 key share 4 key share n

....

Encrypted Content Encrypted Content Encrypted Content Encrypted Content Encrypted Content SVR1 SVR 1 SVR1 SVR 2 SVR1 SVR 3 SVR1 SVR 4 SVR1 SVR n

Shamir's secret sharing

key share 1 Encrypted Content Encrypted Content Encrypted Content key share 3 key share 4 Content random key K

Encryption

Idea: hash of encrypted content and share determines the placement.

slide-37
SLIDE 37

CSE545 - Advanced Network Security - Professor McDaniel

Page

Publius proxies

  • Publius proxies running on a user’s local machine or on

the network handle all the publish and retrieve

  • perations
  • Proxies also allow publishers to delete and update

content

Publishers Servers Retrievers P R O X Y P R O X Y

slide-38
SLIDE 38

CSE545 - Advanced Network Security - Professor McDaniel

Page

Threats and limitations

  • Attacks on server resources
  • 100K Content Limit (easy to subvert)
  • Server limits # of files it will store
  • Possibility: use a payment scheme
  • Threats to publisher anonymity
  • “Rubber-Hose Cryptanalysis”
  • Added “don’t update” and don’t delete bit
  • Logging, network segment eavesdropping
  • Collaboration of servers to censor content
  • A feature?
slide-39
SLIDE 39

CSE545 - Advanced Network Security - Professor McDaniel

Page

Discussion

  • Technology that can protect “good” speech also protects

“bad” speech

  • What if your dog does publish your secrets to the

Internet and you can't do anything about it?

  • Is building a censorship-resistant publishing system

irresponsible?

  • If a tree falls in a forest and nobody hears it….