Mixminion
a best-of-breed anonymous remailer Nick Mathewson, Roger Dingledine
(systems track) {nickm,arma}@freehaven.net The Free Haven Project
Mixminion a best-of-breed anonymous remailer (systems track) Nick - - PowerPoint PPT Presentation
Mixminion a best-of-breed anonymous remailer (systems track) Nick Mathewson, Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net Scope Introduction to anonymity How we got started Introduction to mix-nets
a best-of-breed anonymous remailer Nick Mathewson, Roger Dingledine
(systems track) {nickm,arma}@freehaven.net The Free Haven Project
Untraceability: hide connection between senders and recipients. Unlinkability: hide connection between actions by the same sender. A.K.A. Relationship privacy, traffic-analysis resistance, “security” Sender vs Recipient anonymity high-latency vs low-latency systems
whistleblowing, reporting, ...)
enforcement)
volumes of communication)
Two incompatible systems, no full specification, known flaws, ugly code.
work needed)
The importance of adoption
Anonymity systems rely on network effects more than do other cryptographic systems:
class.” (?)
users: must support clear-text delivery
(unsynchronized, unreliable)
network
Weak attackers are stopped; Strong attackers are only delayed. (Choose for reality, not for security proofs.)
Chaum 1981 Penet-style cypherpunk (type I) 1992 Mixmaster (type II) 1995 Mixminion (type III) 2003 “improved” cpunk Later anonymity research
Alice Bob,M M Bob
example: anon.penet.fi Remailer
AliceERemailer(Bob,M) M Bob
Remailer
Alice EMix(Bob,M) M Bob
(Chaum, 1981) Mix Dave Ellen Carol Fred
(Chaum, 1981) Alice M1 M2 M3 M4
EM1(M2,EM2(M3,EM3(Bob,Msg))) EM2(M3,EM3(Bob,Msg)) EM3(Bob,Msg)
Bob
Msg
by directory choice.
Mixmaster (type II)
All the problems of Mixmaster, plus...
And so much, much more
“Cypherpunk” (type I)
payload at each hop Seemingly: Must forward and reply messages be distinguishable?
except at recipient solution: use the LIONESS large-block SPRP construction to ensure that modified data is completely unrecoverable; use two headers with hashes for each; do a Feistel-like step when exchanging headers.
systems)
capabilities and reliability
protocol.
~400 packets per day; most are pings.)
(reply recognition) (retry timing) (directory agreement problem)
network, users, and attackers, we can win in theory...
a real adversary in the real world, even if they would win eventually in theory.
Mixminion: Design of a Type III Anonymous Remailer Protocol (Danezis, Dingledine and Mathewson, 2003)