theory and design of low latency anonymity systems
play

Theory and Design of Low-latency Anonymity Systems (Lecture 3) Paul - PowerPoint PPT Presentation

Theory and Design of Low-latency Anonymity Systems (Lecture 3) Paul Syverson U.S. Naval Research Laboratory syverson@itd.nrl.navy.mil http://www.syverson.org 1 Reminders Paul, dont trail off in volume when speaking. Attendees, if Paul


  1. Adversary positions on circuits u 1 2 d v e 3 5 4 w f 1. First router compromised 2. Last router compromised 3. First and last compromised 4. Neither first nor last compromised

  2. Black-box Abstraction u d v e w f

  3. Black-box Abstraction u d v e w f 1. Users choose a destination

  4. Black-box Abstraction u d v e w f 1. Users choose a destination 2. Some inputs are observed

  5. Black-box Abstraction u d v e w f 1. Users choose a destination 2. Some inputs are observed 3. Some outputs are observed

  6. Black-box Anonymity u d v e w f • The adversary can link observed inputs and outputs of the same user.

  7. Black-box Anonymity u d v e w f • The adversary can link observed inputs and outputs of the same user. • Any configuration consistent with these observations is indistinguishable to the adversary.

  8. Black-box Anonymity u d v e w f • The adversary can link observed inputs and outputs of the same user. • Any configuration consistent with these observations is indistinguishable to the adversary .

  9. Black-box Anonymity u d v e w f • The adversary can link observed inputs and outputs of the same user. • Any configuration consistent with these observations is indistinguishable to the adversary.

  10. Probabilistic Black-box u d v e w f

  11. Probabilistic Black-box u d v e w f p u • Each user v selects a destination from distribution p v

  12. Probabilistic Black-box u d v e w f p u • Each user v selects a destination from distribution p v • Inputs and outputs are observed independently with probability b

  13. Probabilistic Anonymity u d v e w f u d u d u d v e v e v e w f w f w f Indistinguishable configurations

  14. Probabilistic Anonymity u d v e w f u d u d u d v e v e v e w f w f w f Indistinguishable configurations Conditional distribution: Pr[ u → d ] = 1

  15. Black Box Model Let U be the set of users. Let Δ be the set of destinations. Configuration C • User destinations C D : U → Δ • Observed inputs C I : U → {0,1} • Observed outputs C O : U → {0,1} Let X be a random configuration such that: Pr[ X = C ] = ∏ u p u CD ( u ) ⋅ b CI ( u ) (1- b ) 1- CI ( u ) ⋅ b CO ( u ) (1- b ) 1- CO ( u )

  16. Probabilistic Anonymity The metric Y for the unlinkability of u and d in C is: Y ( C ) = Pr[ X D ( u )= d | X ≈ C ]

  17. Probabilistic Anonymity The metric Y for the unlinkability of u and d in C is: Y ( C ) = Pr[ X D ( u )= d | X ≈ C ] Note: There are several other candidates for a probabilistic anonymity metric, e . g . entropy

  18. Probabilistic Anonymity The metric Y for the unlinkability of u and d in C is: Y ( C ) = Pr[ X D ( u )= d | X ≈ C ] Exact Bayesian inference • Adversary after long-term intersection attack • Worst-case adversary

  19. Probabilistic Anonymity The metric Y for the unlinkability of u and d in C is: Y ( C ) = Pr[ X D ( u )= d | X ≈ C ] Exact Bayesian inference • Adversary after long-term intersection attack • Worst-case adversary Unlinkability given that u visits d : E [ Y | X D ( u )= d ]

  20. Worst-case Anonymity

  21. Worst-case Anonymity Let p u 1 ≥ p u 2 ≥ p u d-1 ≥ p u d+1 ≥ … ≥ p u δ Theorem 1: The maximum of E [ Y | X D ( u )= d ] over ( p v ) v ≠ u occurs when 1. p v δ =1 for all v ≠ u OR 2. p v d =1 for all v ≠ u

  22. Worst-case Estimates Let n be the number of users.

  23. Worst-case Estimates Let n be the number of users. Theorem 2: When p v δ =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b + b (1- b ) p u d + d [ (1- b )/(1-(1- p u δ ) b )) + O ( √ log n / n ) ] (1- b ) 2 p u

  24. Worst-case Estimates Let n be the number of users. Theorem 2: When p v δ =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b + b (1- b ) p u d + d [ (1- b )/(1-(1- p u δ ) b )) + O ( √ log n / n ) ] (1- b ) 2 p u ≈ b + (1- b ) p u d

  25. Worst-case Estimates Let n be the number of users. Theorem 2: When p v δ =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b + b (1- b ) p u d + d [ (1- b )/(1-(1- p u δ ) b )) + O ( √ log n / n ) ] (1- b ) 2 p u ≈ b + (1- b ) p u d E[ Y | X D ( u )= d ] ≥ b 2 + (1-b 2 ) p u d

  26. Worst-case Estimates Let n be the number of users. Theorem 2: When p v δ =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b + b (1- b ) p u d + d [ (1- b )/(1-(1- p u δ ) b )) + O ( √ log n / n ) ] (1- b ) 2 p u ≈ b + (1- b ) p u d E[ Y | X D ( u )= d ] ≥ b 2 + (1-b 2 ) p u d Increased chance of total compromise from b 2 to b.

  27. Worst-case Estimates Let n be the number of users. Theorem 2: When p v δ =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b + b (1- b ) p u d + d [ (1- b )/(1-(1- p u δ ) b )) + O ( √ log n / n ) ] (1- b ) 2 p u Theorem 3: When p v d =1 for all v ≠ u : E[ Y | X D ( u )= d ] = b 2 + b (1- b ) p u d + d ) b ) + O ( √ log n / n ) ] (1- b ) p u d /(1-(1- p u

  28. Typical Case Let each user select from the Zipfian distribution: p di = 1/( µ i s ) (Has been shown web destinations follow Zipf distribution.) Theorem 4: E [ Y | X D ( u )= d ] = b 2 + (1 − b 2 ) p u d + O (1/ n )

  29. Typical Case Let each user select from the Zipfian distribution: p di = 1/( µ i s ) Theorem 4: E [ Y | X D ( u )= d ] = b 2 + (1 − b 2 ) p u d + O (1/ n ) Theorem proof does not depend on particular distribution as much as that it is the same distribution across users.

  30. Summary of probabilistic analysis 1. Used a black-box abstraction to create a probabilistic model of onion routing 2. Analyzed unlinkability a. Provided worst-case bounds b. Examined a typical case

  31. Potential Future Work 1. Extend analysis to other types of anonymity and to other systems. 2. Examine how quickly users distribution are learned. 3. Analyze entry guard choice. • If sensitive destinations are rare, maybe better not using guards?

  32. What is a Hidden Server? Alice can connect to Bob's server  without knowing where it is or possibly who he is Who needs this?  70

  33. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 71

  34. MSN Spaces in China MSN blocked search results and creation  of blog titles with “democracy”, “human rights”, and “freedom of expression”. Dec. 2005: MSN Spaces yanked the blog  of Zhao Jing (Michael Anti) both in China and globally Later changed policy to only remove  access from China and only after formal legal notice 72

  35. What's being done against censorship? The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 73

  36. It's not just about access to information The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 74

  37. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 75

  38. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. It's not only about dissidents in faraway lands 76

  39. EFF Blogging Tips (from Delaware Online April 23, '07) TIPS FOR BLOGGING ABOUT JOB The Electronic Frontier Foundation, a group that protects the rights of bloggers and other Internet users, offers some tips for blogging about work: • Don't blog using office computers. • Use a pseudonym for yourself, and don't identify your employer by name. • Don't include details about the company from which a reader can figure out who you work for. • Don't post pictures of yourself on your blog, by which someone can figure out who you are. • Consider using a service like invisiblog.com, which hosts anonymous blogs for free, or LiveJournal, which restricts access to your blog to those with a password or to people you designate as friends. Source: Electronic Frontier Foundation 77

  40. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 78

  41. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 79

  42. Limits of irrepressible.info and invisiblog.com invisiblog must be hosted somewhere that  is not censored or blocked or abandoned - Same for site of censored information  irrepressible.info points at censored websites about Uzbekistan can be - pointed at by irrepressible.info but not from Uzbekistan or seen from Uzbekistan site must be anonymized to keep originators - Out of prison  Employed  80

  43. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 81

  44. More Hidden Server Applications Already extensively discussed  Censorship resistant publishers - Identity protecting publishing - Low cost DDoS resistance  Multilevel secure chat servers  Automated downgraders of classified docs  Private location tracking  82

  45. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 83

  46. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 84

  47. Hidden Server Goals Servers accessible from anywhere  Resist attacks from authorized users  Resist Distributed DoS  Resist physical attack  Minimize redundancy, Reduce costs  85

  48. Location Hidden Servers Alice can connect to Bob's server without  knowing where it is or possibly who he is Already told you why this is desirable,  but... How is this possible?  86

  49. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 87

  50. Location Hidden Servers 1. Server Bob creates onion routes to Introduction Points (IP) (All routes in these pictures are onion routed through Tor) The image cannot be displayed. 1 Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 1 Bob's Server 1 Introduction Points 88

  51. Location Hidden Servers 1. Server Bob creates onion routes to Introduction Points (IPo) 2. Bob publishes his xyz.onion address and puts Service Descriptor incl. Intro Pt. listed under xyz.onion 1 1 Bob's Server 1 Alice's Client Introduction Service Points XYZ Service Lookup 2 Server 89

  52. The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 90

  53. Location Hidden Servers 2'. Alice uses xyz.onion to get Service Descriptor (including Intro Pt. address) at Lookup Server 1 1 Bob's Server 1 Alice's 2' Client Introduction Service Points XYZ Service Lookup 2 Server 91

  54. Location Hidden Servers 3. Client Alice creates onion route to Rendezvous Point (RP) Rendezvous Point 1 3 1 Bob's Server 1 Alice's 2' Client Introduction Service Points Lookup 2 Server 92

  55. Location Hidden Servers 3. Client Alice creates onion route to Rendezvous Point (RP) 4. Alice sends RP address and any authorization through IPo to Bob Rendezvous Point 1 3 1 4 Bob's Server 1 Alice's 2' Client Introduction Service Points Lookup 2 Server 93

  56. Location Hidden Servers 5. If Bob chooses to talk to Alice, connects to Rendezvous Point 6. Rendezvous Point mates the circuits from Alice and Bob Rendezvous 6 Point 5 1 3 1 4 Bob's 1 Server Alice's 2' Client Introduction Service Points Lookup 2 Server 94

  57. Location Hidden Servers Final resulting communication channel Rendezvous Point The image cannot be displayed. Your computer may not have enough memory The image cannot to open the be displayed. image, or the image may have Your computer may not have been corrupted. enough memory Restart your to open the computer, and image, or the image may have been corrupted. Restart your computer, and Bob's Server Alice's Client 95

  58. Attacking Hidden Servers In 2006 we showed how to identify a hidden  server on the live Tor network in a few minutes to a few hours (depending on configurations) by owning a single hostile node in the network Note for just the anonymity geeks: This included  the first intersection attack of any kind actually conducted on a live network 96

  59. Attacking Hidden Servers (Not Simulations) The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 97

  60. Attacking Hidden Servers (Actual Attacks on Servers in the Wild) The image cannot be displayed. Your computer may not have enough memory to open the image, or the image may have been corrupted. Restart your computer, and then open the file again. If the red x still appears, you may have to delete the image and then insert it again. 98

  61. Location Attacks Outline Attack Overview  Phase I: Match the timing signature - Phase II: Find node position in circuit - Client/Server Separation  Intersection  Two Node Attack  Countermeasures (some work -- and  some don't) 99

  62. Normal Scenario Closeup Tor-connection to Hidden Service Rendezvous Point Hidden Service The image cannot be The image cannot be The image cannot be The image cannot be The image cannot be The displayed. Your computer displayed. Your computer displayed. Your computer displayed. Your computer displayed. Your computer image may not have enough may not have enough may not have enough may not have enough may not have enough cannot memory to open the image, memory to open the image, memory to open the image, memory to open the image, memory to open the image, be or the image may have been or the image may have been or the image may have or the image may have or the image may have display corrupted. Restart your corrupted. Restart your been corrupted. Restart been corrupted. Restart been corrupted. Restart ed. computer, and then open computer, and then open your computer, and then your computer, and then your computer, and then Your the file again. If the red x the file again. If the red x open the file again. If the open the file again. If the open the file again. If the compu still appears, you may have still appears, you may have red x still appears, you may red x still appears, you may red x still appears, you may ter to delete the image and to delete the image and have to delete the image have to delete the image have to delete the image may then insert it again. then insert it again. and then insert it again. and then insert it again. and then insert it again. not have enoug h memor y to open Client The image cannot be The image cannot be displayed. Your computer displayed. Your computer may not have enough may not have enough memory to open the image, memory to open the image, The image cannot be or the image may have been or the image may have been displayed. Your computer corrupted. Restart your corrupted. Restart your may not have enough computer, and then open computer, and then open memory to open the image, the file again. If the red x the file again. If the red x or the image may have still appears, you may have still appears, you may have been corrupted. Restart to delete the image and to delete the image and your computer, and then then insert it again. then insert it again. 100

Recommend


More recommend