Vuvuzela
a scalable private messaging system
David Lazar Jelle van den Hooff, Matei Zaharia, Nickolai Zeldovich
Vuvuzela a scalable private messaging system David Lazar Jelle van - - PowerPoint PPT Presentation
Vuvuzela a scalable private messaging system David Lazar Jelle van den Hooff, Matei Zaharia, Nickolai Zeldovich Motivation Alice Bob (Oncologist) Encryption Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo Alice Bob (Oncologist) Problem: metadata
a scalable private messaging system
David Lazar Jelle van den Hooff, Matei Zaharia, Nickolai Zeldovich
Alice Bob (Oncologist)
Alice Bob (Oncologist)
Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo
Alice Bob (Oncologist)
Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo
NY Times Hospital Lawyer
Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House
Alice Bob (Oncologist)
NY Times Hospital Lawyer
Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House
Vuvuzela
Alice Bob (Oncologist)
NY Times Hospital Lawyer
Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House
Vuvuzela
Alice Bob (Oncologist)
NY Times Hospital Lawyer
Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House
Vuvuzela
Bob Alice
Tor network
Bob Alice
Tor network
Bob Alice
Tor network
Low-Cost Traffic Analysis of Tor
Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk Abstract
Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Inter- net. Its low latency makes it very suitable for common tasks, such as web browsing, but insecure against traffic- analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with
being used to relay the anonymous streams and therefore Other systems, based on the idea of a mix, were de- veloped to carry low latency traffic. ISDN mixes [33] propose a design that allows phone conversations to be anonymised, and web-mixes [6] follow the same design pat- terns to anonymise web traffic. A service based on these ideas, the Java Anon Proxy (JAP)1 has been implemented and is running at the University of Dresden. These ap- proaches work in a synchronous fashion, which is not well adapted for the asynchronous nature of widely deployed TCP/IP networks [8].
Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries
Aaron Johnson1 Chris Wacek2
1U.S. Naval Research Laboratory, Washington DC{aaron.m.johnson, rob.g.jansen, paul.syverson}@nrl.navy.mil
Rob Jansen1 Micah Sherr2 Paul Syverson1
2Georgetown University, Washington DC{cwacek, msherr}@cs.georgetown.edu
ABSTRACT
We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realis- tic adversaries in the Tor network or in the underlying Internet. Our results show that Tor users are far more susceptible to compromise than indicated by prior work. Specific contributions of the paper include (1) a model of various typical kinds of users, (2) an adver- The traffic correlation problem in Tor has seen much attention in the literature. Prior Tor security analyses often consider entropy
by the system at a static point in time. In addition, while prior metrics of security may provide useful information about overall usage, they typically do not tell users how secure a type of behav- ior is. Further, similar previous work has thus far only considered adversaries that control either a subset of the members of the Tor
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
Albert Kwon†, Mashael AlSabah‡§†∗, David Lazar†, Marc Dacier‡, and Srinivas Devadas†
†Massachusetts Institute of Technology, {kwonal,lazard,devadas}@mit.edu ‡Qatar Computing Research Institute, mdacier@qf.org.qa §Qatar University, malsabah@qu.edu.qa
This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break the anonymity of hidden service clients and operators pas- sively. In particular, we show that the circuits, paths established through the Tor network, used to commu- nicate with hidden services exhibit a very different be- havior compared to a general circuit. We propose two attacks, under two slightly different threat models, that As a result, many sensitive services are only accessi- ble through Tor. Prominent examples include human rights and whistleblowing organizations such as Wik- ileaks and Globalleaks, tools for anonymous messag- ing such as TorChat and Bitmessage, and black markets like Silkroad and Black Market Reloaded. Even many non-hidden services, like Facebook and DuckDuckGo, recently have started providing hidden versions of their
Privacy Scalability Tor Dissent [OSDI 2012] Riposte [Oakland 2015] Pond
Privacy Scalability Tor Vuvuzela Dissent [OSDI 2012] Riposte [Oakland 2015] Pond
metadata from powerful adversaries for millions of users
for one million users
the first server
Bob Alice Charlie
Server 1 Server 2 Server 3
what messages and sends them back down the chain
Dialing protocol:
Initiate conversation session between two users
Bob Alice Charlie
Conversation protocol:
Exchange messages between two users
Bob Alice Charlie
(besides you and your friends)
Bob Alice Charlie Bob Alice Charlie Bob Alice Charlie Vuvuzela Vuvuzela Vuvuzela
Scenario 1 Scenario 2 Scenario 3
Bob Alice Charlie Bob Alice Charlie Bob Alice Charlie Vuvuzela Vuvuzela Vuvuzela
Scenario 1 Scenario 2 Scenario 3
traffic analysis hacked servers
47D1FC9A…
metadata as possible.
privacy the noise gives us.
Bob Alice Charlie
Dead drop: a place to leave a message that another user can pick up
Bob Alice Charlie
Dead drop: zzp8ns0nrxt3g9efb6c Message: “Hi Bob! How’s it going?” Dead drop: zzp8ns0nrxt3g9efb6c Message: “”
Bob Alice Charlie
Dead drop: zzp8ns0nrxt3g9efb6c Message: “Hi Bob! How’s it going?” Dead drop: zzp8ns0nrxt3g9efb6c Message: “”
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : “ ” D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : “ I ’ m g
, t h a n k s ! ”
Bob Alice Charlie
Bob Alice Charlie
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j …
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j …
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…
Bob Alice Charlie
D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r
: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…
Bob Alice Charlie
Bob Alice Charlie
A B C
Bob Alice Charlie
A B C
Bob Alice Charlie
A B C
Bob Alice Charlie
2 1
Bob Alice Charlie
2 1 Challenge: dead drop counts reveal access patterns
Let’s see why access counts are a problem.
Bob Alice Charlie
1 2 1 1 2
Fake exchanges (noise)
Dead drop: 3nPki8GbZWfXRyw61wk Message: nE7yvLJLeiCvcD1Cu62… Dead drop: 3nPki8GbZWfXRyw61wk Message: 4QjdRfoB7GoEEb0vtMjf… Dead drop: kt2JnceRb7ieU3M1k5Oj Message: mb4ZgDABTLTtm9rUZzV… Dead drop: kt2JnceRb7ieU3M1k5Oj Message: wYNxuyoOiP9Ffjr4LKtv38… Dead drop: RY9VjW4XROtTcbnZPaJ Message: Bzizd2loCIeXdIfHU33mds… Dead drop: LWnyE3AB2TTmUcCGL Message: k1bVsoTVlJQTEy92Vxd1o… Dead drop: LWnyE3AB2TTmUcCGL Message: mTLa2cdkKgzADt0oJm8s… Dead drop: t53c81TtFdmBCzFLQ7Q Message: rCCnMCttJ8C8JMthLxN8… Dead drop: pavnHQmuegSmvXz6Y5 Message: IuA94shFx7okpZdBacjBg…
Fake singles Fake doubles
Vuvuzela with noise is effective!
Bob Alice Vuvuzela
Pr[ i | Alice talked to Bob]
Bob Alice Vuvuzela
Bob Alice Vuvuzela
Pr[ i | Alice talked to Bob]
Bob Alice Vuvuzela
accesses in a single round.
these distributions very close (indistinguishable):
Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]
250 Probability Dead drops with two messages 1 Probability Dead drops with two messages
250 Probability Dead drops with two messages
Constraints:
differential privacy
Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]
250 Probability Dead drops with two messages
Constraints:
differential privacy
Average noise is hundreds of fake messages
Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]
system practical.
users get.
doubles per server per round.
1 2 3 4 5 6 7 8 9 10,000 100,000 1M 2M
Pr[ i | Alice talked to Bob] ≤ 𝜻 × Pr[ i | not Alice talked to Bob]
messages through Vuvuzela.
evidence!
(NSA is intimidating, other evidence, etc)
50 67 75 80 83 86 88 89 90 10,000 100,000 1M 2M Jury certainty % Messages Alice wants to keep private
starts
users and messages?
Client VMs Entry server Server 1 Server 2 Server 3
0 s 10 s 20 s 30 s 40 s 50 s 60 s 10 500,000 1M 1.5M 2M End-to-end latency for conversation messages Number of online users
linearly
the adversary cares about