the free haven project distributed anonymous storage
play

The Free Haven project: Distributed Anonymous Storage Service R. - PowerPoint PPT Presentation

http://www.freehaven.net The Free Haven project: Distributed Anonymous Storage Service R. Dingledine (MIT), M.J. Freedman(MIT) and S. Molnar(Harvard) Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000


  1. ☞ http://www.freehaven.net The Free Haven project: Distributed Anonymous Storage Service R. Dingledine (MIT), M.J. Freedman(MIT) and S. Molnar(Harvard) Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, July 2000 Presenter: Dragos Niculescu

  2. ☞ summary ❍ problem statement ❍ terminology ❍ related work ❍ freehaven design − basic idea − publication − trading − accountability − possible attacks ❍ conclusions

  3. ☞ problem statement ❍ storage system − anonymous − resists powerful adversaries to find/destroy data ❍ goals − anonymity - publishers, readers, servers − persistence - determined by publisher − flexibility - add/remove nodes − accountability - reputation

  4. ☎✝ ✁ ✂ ✟ ✞ ✁ ✄ �✁ ✄ ✁ ✂ ✞ ✟ ✞ ✟ ✂ ✞ ✄ �✁ �✁ ✞ ✁ ✂ ✟ �✁ ☛☞ ✌ ☛ ✄ ✟ ☎✝ ☞ terminology ❍ anonymity ❍ pseudonymity ❍ agents: author, publisher, server, reader ❍ safe communication channel - cypherpunks remailer blocks ❍ symmetric keys: (public) and (secret) − ✟✡✠ ✟✡✠ ✄✆☎✝ − = authenticates sender ✄✆☎✝ − = authenticates reader ✄✆☎✝ ❍ - noninvertible functions (MD5)

  5. � � � � � ☞ anonymity ❍ author-anonymity (document author) ❍ publisher-anonymity (document publisher) ❍ reader-anonymity (document readers) ❍ server-anonymity (document servers) ❍ document-anonymity (server does not know what documents it stores) − passive: cannot recreate document based only on data it stores. − active: may compare data with other servers. ❍ query-anonymity (request document)

  6. ☞ summary ❍ problem statement ❍ terminology ❍ related work ❍ freehaven design − basic idea − publication − trading − accountability − possible attacks ❍ conclusions

  7. �✁ ☞ anonymous remailers- cypherpunk ❍ a network of servers running specialized mail servers ❍ a message − is sent across a chain of remailers − is ecrypted with of remailers in the chain ❍ a remailer − only knows identity of prev/next remailer − serve anonymous , not pseudonymous email − can send to unknown destinations

  8. ✂ �✁ �✁ ✁ ☞ pseudonym remailers - nymserver ❍ use cypherpunk remailers and a pseudonym server ❍ to send email from the nym, one sends it to send@nymserver.net ❍ to config the nym, requests go to config@nymserver.net ❍ for each (pseudo)nym, the server keeps: − • all mail from the nym is encrypted with the • all mail to the nym is encrypted with this − reply block • cypherpunk chain to the true destination • the last remailer(innermost) knows the real address • the real address may be alt.anonymous.messages − configuration settings

  9. ☞ Pseudonym Server: rem@isp.nl: rem@b.edu: Message cyphertext−A cyphertext−B sign, encrypt w. PGP encrypt w. PGP encrypt w. nym public key symmetric key2 symmetric key1 PGP encrypt w. cyphertext−B cyphertext−C symmetric key3 cyphertext−A b. E ncrypt i ons perfo rmed on messagesat each remailer

  10. ☞ Anon−To: usr@a.com Latent−Time: +1:00r Anon−To: rem@b.edu Encrypt−Key: key1 Latent−Time: +1:00r Encrypt−Key: key2 Anon−To: rem@isp.nl PGP encrypt for rem@b.edu replyblock−1 Latent−Time: +1:00r Encrypt−Key: key3 PGP encrypt for rem@isp.nl replyblock−2 y a user toconstructarep s performed b a. Step l y bloc k with t wo hops Pseudonym Server rem@isp.nl rem@b.edu usr@a.com replyblock−1 replyblock−2 cyphertext−C cyphertext−B cyphertext−A c. The actu al data thattrav ersesthe network

  11. ☞ related work - napster, gnutella ❍ napster − central directory with filenames − server supports directory searching − logical p2p, but physical client-server − no anonymity ❍ gnutella − true p2p − dynamic graph - each node chooses its degree − a query has a TTL and is sent to all neighbors − nodes directly report hits − no anonymity - “Gnutella Wall of Shame” − bottlenecks in the middle − bootstrap - implicit hierarchy − spam

  12. � ☞ related work - freenet ❍ high accessibility ❍ documents are encrypted with their names ❍ query − hash of the document name − fwd to more likely nearby server ❍ document lifetime popularity ❍ anonymity: sender, reader, server

  13. ☞ related work - mojo nation ❍ focus is accessibility, not anonymity ❍ digital cash = mojo ❍ central bank to handle mojo transactions ❍ trackers: − content - keeps sharemaps − metatracker - what servers keep what shares − publication - tracks documents ❍ each server has a bitmask describing allowed shares

  14. ✁ � � � ✁ ☞ related work - mojo nation ❍ publish − doc is split in 8 pieces, any 4 of which can rebuild the original − hashes of the 8 pieces sharemap − sharemap is split in 8 content tracker − pay to store a share on a server ❍ query − content tracker info about 8 pieces of sharemap − metatracker servers covering address spaces for the pieces − buy pieces and rebuild the sharemap − repeat for the document pieces ❍ document lifetime popularity

  15. ☞ related work - eternity service ❍ publisher − uploads doc and digital cash − uploads to 100 servers, monitors only 10 ❍ servers − broadcast queries − delivery through anonymous remailers ❍ problems − digital cash − what to do with cheating servers (stop payment) − no smooth join/leave

  16. ☞ related work - USENET “eternity” ❍ uses normal NNTP for retrieval/posting/expiring ❍ documents are − in html format − stored in alt.anonymous.messages − PGP signed by publishers - pseudonym − posted through cypherpunks ❍ reader anonymity - a user download all today’s messages ❍ append only document system ❍ not censorable

  17. ☎✝ ✁ ✁ ✁ � ✁ � ✁ ✟ � ✞ ✁ ✄ ✁ ☞ related work - Publius ❍ focus on availability and anonymity ❍ publish − encrypt document with key − split in shares, any of which can rebuild − sends and a share to servers − “name” of the doc = addresses of the servers ❍ query − run a local web proxy − contact servers, rebuild ❍ doesn’t have − accountability - DoS with garbage − smooth join/leave for servers

  18. ☞ summary ❍ problem statement ❍ terminology ❍ related work ❍ freehaven design − basic idea − publication − trading − accountability − possible attacks ❍ conclusions

  19. ✁ ☞ freehaven - basic ideas “anonymity for anonymous storage” ❍ servnet = community of servers ❍ true p2p: all clients/users are servers ❍ users query the entire servnet at once, not one particular server ❍ publishers convince a single server to publish ❍ nobody knows where any server is located (pseudonymity) ❍ servers form contracts to store each other’s material − trade − reputation ❍ a server gives up space gets space on other servers

  20. ✟ ✂✄ ☎ �✁ ✂ ✄ ☎ ✟ ✂ ✁ ☎ ✁ ☛ ☞ ✌ ☛ ✄ �✁ ✂✄ ☎ ✂✄ ✆ ✂ � � � � ✁ � ✁ � ✄ ✁ ☞ freehaven - publication ❍ split doc into shares, of which can rebuild the file ( ) − large brittle file − small larger share, more duplication ❍ generate and encrypt each share with ❍ store on a server: − encrypted share − timestamp − expiration date −

  21. ☛ ☎ �✁ ☛ ☞ ✌ ✟ ✄ �✁ ✂✄ ☎ ✟ �✁ ✁ ☎ � ✁ ✂ ✄☎ ✄ ✂ �✁ ✄ ☛ ☞ ☎ � ✟ ☛ ✂ ✄☎ ☛ ☞ ✌ ☛ ✄ �✁ ✂ ✄ ☎ ✟ ✄ ✄☎ �✁ ☎ � ✁ ✂ ✄☎ ✆ ✂ ✁ ☎ � ✁ ✂ ✌ ☞ freehaven - retrieval ❍ documents are indexed by ❍ reader generates and a one-time remailer reply block ❍ reader broadcasts , and the remailer block − to all servers it knows about − broadcasts may be queued and bulk sent ❍ servers holding shares with − encode the share with − send it using the remailer block

  22. ✌ � ✁✂ ✄ ☎ � ✆ ✂ ✝ � ✞ ✂ ☞ freehaven - share expiration ❍ absolute date ❍ “price” of a file = ❍ Freenet and Mojo nation favor popular documents

  23. � ✁ ✂ � ✁ ✂ ✝ ✂ ☎ ✂ ☎ ✟ � ✂ � ☎ ✌ ✝ ✂ ☎ ☛ ☞ ✂ ✂ ✄ ☛ ☞ freehaven - document revocation ❍ could be simple: − store a _ inside each share − broadcast _ to have all servers delete the shares ❍ but: − allows new attacks − decreases consistency (unreached shares) • poor channels • malicious servers dropping delete requests − revoke capability incentive for adversaries to pressure/threaten

  24. ☞ summary ❍ problem statement ❍ terminology ❍ related work ❍ freehaven design − basic idea − publication − trading − accountability − possible attacks ❍ conclusions

  25. ☞ trading - why? ❍ to provide a cover for publishing ❍ to let servers join and leave − well behaved, but transient servers ❍ to permit longer expiration dates ❍ to accommodate ethical concerns of server operators − attack: lists of “discouraged” documents ❍ to provide a moving target

  26. ✆ ✂ ✂ ✞ � ✌ � ✁✂ ✄ ☎ � ✝ ☞ freehaven - trading ❍ frequency set by server operator ❍ use reputation to choose partners ❍ currency is ❍ rounds − exchange shares − exchange receipts − send receipts to buddies

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend