mixminion a next generation anonymous remailer george
play

Mixminion: A next-generation anonymous remailer George Danezis - PowerPoint PPT Presentation

Mixminion: A next-generation anonymous remailer George Danezis Roger Dingledine Nick Mathewson 1 Outline Background Related systems A few improvements over past work Secure single-use reply block mechanism 2 Anonymous,


  1. Mixminion: A next-generation anonymous remailer George Danezis Roger Dingledine Nick Mathewson 1

  2. Outline • Background • Related systems • A few improvements over past work • Secure single-use reply block mechanism 2

  3. Anonymous, message-based communication • Forward messages, only Alice remains anonymous • Direct replies, only Bob remains anonymous • Anonymized reply messages where Alice and Bob remain anonymous 3

  4. Threat Model (we hope) • Global passive adversary: can observe all links • Controls some of the nodes/links • Can send, modify, delay, etc some messages We are not real-time, fast, packet-based, or steganographic. 4

  5. Basic building block: Mix ... ... ... E(...M,B) A ... Mix M ... B ... A mix batches, decrypts, and reorders messages 5

  6. Multiple Hops E ...(E (M,to B), to 2) E ...(M,to B) M 1 2 2 A B 1 2 Assume not all hops will collude and reveal A 6

  7. Fixed length messages by re-padding 2 3 1 3 ... ... M M 3 • Add random junk to the bottom to replace the info you strip off. Everything’s encrypted, so it looks ok. 7

  8. Reply block D(D(...(M))) M,"bob" D(M),D("bob") A B 2 1 ... • “bob” = 1 , E 1 (2 , ...E n ( B )) • In Mixminion, replies act like forward messages. 8

  9. Related systems • One-hop: Anonymizer, hotmail, etc • Low-latency: onion routing, Freedom • Remailers: Cypherpunk, Mixmaster, Babel • Other: flash mix, hybrid mix, provable shuffle, etc 9

  10. Integrated directory servers Act as reputation servers too • Mixmaster’s ad hoc scheme opens users up to partitioning attacks. • Directory servers can be out of sync; evil DSs can give out rigged subsets to trace clients. • DSs must successively sign directory bundles; a threshold of servers is assumed good. 10

  11. Link encryption for forward anonymity • Mixmaster uses SMTP for transport • We use TLS over TCP • Link encryption and short-term keys stop many attacks 11

  12. Key rotation / Replay prevention • Mixmaster has no built-in key rotation • ...and sketchy replay detection mechanism • Solve them together: we keep hashes of all messages seen since the last key rotation. 12

  13. Tagging attack on headers • Mixmaster/Babel headers have a hash to integrity- check that hop. Doesn’t check the rest of the header! • We can flip some bits later in the header. If we own the hop that corresponds to the part we just broke, we can recognize the message. • So we make the hash cover the entire header. 13

  14. And payload too... But you can’t know the payload when writing a reply block! • Forward messages want hashes, and replies can’t have them. • If replies are rare relative to forwards, replies are easy to track. 14

  15. Messages have two headers and a payload Build a path out of two legs, one for each header • For forward messages, Alice makes both legs • For direct replies, Alice can use the reply block directly • For anonymized replies, Alice makes the first leg and uses Bob’s reply block for the second. 15

  16. Legs are connected by the Crossover Point • One of the hops in the first header is marked as a crossover point • At the crossover point, we decrypt the second header with a hash of the payload, and then swap the headers. 16

  17. Forward messages are anonymous: • If the second header or the payload are tagged in the first leg, then the second header is unrecover- able. • If tagged in the second leg, we’ve already gotten anonymity from the first. 17

  18. Replies are anonymous: • The adversary can never recognize his tag. 18

  19. Multiple-message tagging attacks • If Alice sends multiple messages along the same path, Mallory can tag some, recognize the pattern at the crossover point, and follow the rest. • Only works if Mallory owns the crossover point. • Fix: Alice spreads over k crossover points (and hopes Mallory doesn’t own most of them) 19

  20. Nymservers and single-use reply blocks • Work like pop/imap servers • User anonymously sends a bunch of reply blocks to receive the mail that’s waiting for him. 20

  21. Future work • Dummy traffic policy • Exit abuse • Directory servers • Synchronous batching • More analysis! 21

  22. Play with our code http://mixminion.net/ (Code, mailing list, design, spec) Do you want to run a server? 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend