Mixminion a best-of-breed anonymous remailer (systems track) Nick - - PowerPoint PPT Presentation

mixminion
SMART_READER_LITE
LIVE PREVIEW

Mixminion a best-of-breed anonymous remailer (systems track) Nick - - PowerPoint PPT Presentation

Mixminion a best-of-breed anonymous remailer (systems track) Nick Mathewson, Roger Dingledine The Free Haven Project {nickm,arma}@freehaven.net Scope Introduction to anonymity How we got started Introduction to mix-nets


slide-1
SLIDE 1

Mixminion

a best-of-breed anonymous remailer Nick Mathewson, Roger Dingledine

(systems track) {nickm,arma}@freehaven.net The Free Haven Project

slide-2
SLIDE 2

Scope

  • Introduction to anonymity
  • How we got started
  • Introduction to mix-nets
  • Contributions
  • Lessons learned
  • Future work
slide-3
SLIDE 3

Anonymity: The idea

Untraceability: hide connection between senders and recipients. Unlinkability: hide connection between actions by the same sender. A.K.A. Relationship privacy, traffic-analysis resistance, “security” Sender vs Recipient anonymity high-latency vs low-latency systems

slide-4
SLIDE 4

Who needs it?

  • Private citizens (advocacy, counseling,

whistleblowing, reporting, ...)

  • Higher-level protocols (voting, e-cash, auctions)
  • Government applications (research, law

enforcement)

  • Business applications (hide relationships and

volumes of communication)

  • Is the CEO talking to a buyout partner?
  • Who are your suppliers and customers?
  • Which groups are talking to patent lawyers?
  • Who is visiting job sites?
slide-5
SLIDE 5

Project origins

  • Let’s try implementing our research!
  • Why not use deployed mix-networks?
  • State of deployed mix-networks: bad! (2001)

Two incompatible systems, no full specification, known flaws, ugly code.

  • The Mixminion project
  • Designs (2003), specifications (2003), software (ongoing)
slide-6
SLIDE 6

Mixminion’s goals

  • Resolve flaws of earlier deployed remailers.
  • Conservative design (minimize new design

work needed)

  • Support testing of future research
  • Design for deployment; deploy for use.
slide-7
SLIDE 7

Motivation:

The importance of adoption

Anonymity systems rely on network effects more than do other cryptographic systems:

  • No users, no anonymity.
  • “Safer in the coach seats than riding first

class.” (?)

  • Can’t assume a userbase of cryptographers
slide-8
SLIDE 8

Consequences

  • Software required only for anonymous

users: must support clear-text delivery

  • Must subsume function of earlier systems
  • Must work in real-world internet

(unsynchronized, unreliable)

  • Entire system must be designed, specified
slide-9
SLIDE 9

Consequences: Threat model

  • Global observer: can see all net traffic
  • Runs a fraction of the servers on the

network

  • Can generate or delay traffic

Weak attackers are stopped; Strong attackers are only delayed. (Choose for reality, not for security proofs.)

slide-10
SLIDE 10

Chaum 1981 Penet-style cypherpunk (type I) 1992 Mixmaster (type II) 1995 Mixminion (type III) 2003 “improved” cpunk Later anonymity research

Deployed remailer systems

slide-11
SLIDE 11

Alice Bob,M M Bob

Direct Remailer

example: anon.penet.fi Remailer

slide-12
SLIDE 12

AliceERemailer(Bob,M) M Bob

Add Encryption

Remailer

slide-13
SLIDE 13

Alice EMix(Bob,M) M Bob

Batch and re-order

(Chaum, 1981) Mix Dave Ellen Carol Fred

slide-14
SLIDE 14

Mix-nets

(Chaum, 1981) Alice M1 M2 M3 M4

EM1(M2,EM2(M3,EM3(Bob,Msg))) EM2(M3,EM3(Bob,Msg)) EM3(Bob,Msg)

Bob

Msg

slide-15
SLIDE 15

Flaws of earlier systems (I)

  • Out-of-band ad hoc directories; users partitionable

by directory choice.

  • Optional link encryption
  • Bad code and partial spec (but not any more)
  • No recipient anonymity: nym users fall back
  • n cpunk

Mixmaster (type II)

slide-16
SLIDE 16

Flaws of earlier systems (II)

All the problems of Mixmaster, plus...

  • Non-uniform message length
  • Distinguishable user options
  • Vulnerable to replay attacks
  • Reply blocks vulnerable to flooding attacks
  • Batching and delaying are optional

And so much, much more

“Cypherpunk” (type I)

slide-17
SLIDE 17

Why are replies hard?

  • Forward messages need integrity checking
  • n routing and payload at each hop
  • Replies can’t have integrity checking on

payload at each hop Seemingly: Must forward and reply messages be distinguishable?

slide-18
SLIDE 18

Contributions (I)

  • Secure reply blocks
  • Single-use, replay-proof
  • Replies indistinguishable from fwd messages

except at recipient solution: use the LIONESS large-block SPRP construction to ensure that modified data is completely unrecoverable; use two headers with hashes for each; do a Feistel-like step when exchanging headers.

slide-19
SLIDE 19

Contributions (II)

  • Integrated directory service
  • Enables key rotation (takes months with older

systems)

  • Specified, extensible discovery of server

capabilities and reliability

  • Coordinate multiple directories
slide-20
SLIDE 20

Contributions (III)

  • Uniform forward-secure message transfer

protocol.

  • Simple dummy-traffic policy
slide-21
SLIDE 21

Status

  • First release: Dec 2002
  • First usable release: Jan 2003
  • Design published, specification online
  • Implementation in progress (35 kloc)
  • Now: 29 servers; 12 exits. (each handles

~400 packets per day; most are pings.)

slide-22
SLIDE 22

Lessons (I)

  • Implementation can drive research:
  • uncovers specification gaps
  • suggests new design problems
  • exposes potential security holes

(reply recognition) (retry timing) (directory agreement problem)

slide-23
SLIDE 23

Lessons (II)

  • Theoretical security is not the whole story
  • With carefully defined transport,

network, users, and attackers, we can win in theory...

  • but to win in practice, we must frustrate

a real adversary in the real world, even if they would win eventually in theory.

slide-24
SLIDE 24

Future work

  • Usability and clients
  • Directory coordination
  • DOS limitation
  • Pseudonym service
slide-25
SLIDE 25

For more information, see Mixminion design paper

Mixminion: Design of a Type III Anonymous Remailer Protocol (Danezis, Dingledine and Mathewson, 2003)

slide-26
SLIDE 26
slide-27
SLIDE 27

What about Spam?

  • High-latency mix nets are bad for Spam
  • Comparatively high CPU requirements
  • Latency variability makes blocking easy
  • Still need to receive funds nymously
  • The real problem is abuse
  • Only one msg needed to annoy a newsgroup
  • Block at users request
  • Support for automatic blocking