Vuvuzela a scalable private messaging system David Lazar Jelle van - - PowerPoint PPT Presentation

vuvuzela
SMART_READER_LITE
LIVE PREVIEW

Vuvuzela a scalable private messaging system David Lazar Jelle van - - PowerPoint PPT Presentation

Vuvuzela a scalable private messaging system David Lazar Jelle van den Hooff, Matei Zaharia, Nickolai Zeldovich Motivation Alice Bob (Oncologist) Encryption Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo Alice Bob (Oncologist) Problem: metadata


slide-1
SLIDE 1

Vuvuzela

a scalable private messaging system

David Lazar Jelle van den Hooff, Matei Zaharia, Nickolai Zeldovich

slide-2
SLIDE 2

Motivation

Alice Bob (Oncologist)

slide-3
SLIDE 3

Encryption

Alice Bob (Oncologist)

Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo

slide-4
SLIDE 4

Problem: metadata

Alice Bob (Oncologist)

Z28gUGF0cmlvdHMhCg c2VhaGF3a3Mgc3Vjawo

NY Times Hospital Lawyer

Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House

slide-5
SLIDE 5

Goal: hide metadata

Alice Bob (Oncologist)

NY Times Hospital Lawyer

Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House

Vuvuzela

slide-6
SLIDE 6

Goal: hide metadata

Alice Bob (Oncologist)

NY Times Hospital Lawyer

Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House

Vuvuzela

slide-7
SLIDE 7

Goal: scalability

Alice Bob (Oncologist)

NY Times Hospital Lawyer

Pfizer Lawyer AA Snowden Guardian Ex-boyfriend White House

Vuvuzela

slide-8
SLIDE 8

Tor is scalable

Bob Alice

Tor network

slide-9
SLIDE 9

Bob Alice

Tor network

Tor is insecure

slide-10
SLIDE 10

Bob Alice

Tor network

Tor is insecure

Low-Cost Traffic Analysis of Tor

Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk Abstract

Tor is the second generation Onion Router, supporting the anonymous transport of TCP streams over the Inter- net. Its low latency makes it very suitable for common tasks, such as web browsing, but insecure against traffic- analysis attacks by a global passive adversary. We present new traffic-analysis techniques that allow adversaries with

  • nly a partial view of the network to infer which nodes are

being used to relay the anonymous streams and therefore Other systems, based on the idea of a mix, were de- veloped to carry low latency traffic. ISDN mixes [33] propose a design that allows phone conversations to be anonymised, and web-mixes [6] follow the same design pat- terns to anonymise web traffic. A service based on these ideas, the Java Anon Proxy (JAP)1 has been implemented and is running at the University of Dresden. These ap- proaches work in a synchronous fashion, which is not well adapted for the asynchronous nature of widely deployed TCP/IP networks [8].

Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries

Aaron Johnson1 Chris Wacek2

1U.S. Naval Research Laboratory, Washington DC

{aaron.m.johnson, rob.g.jansen, paul.syverson}@nrl.navy.mil

Rob Jansen1 Micah Sherr2 Paul Syverson1

2Georgetown University, Washington DC

{cwacek, msherr}@cs.georgetown.edu

ABSTRACT

We present the first analysis of the popular Tor anonymity network that indicates the security of typical users against reasonably realis- tic adversaries in the Tor network or in the underlying Internet. Our results show that Tor users are far more susceptible to compromise than indicated by prior work. Specific contributions of the paper include (1) a model of various typical kinds of users, (2) an adver- The traffic correlation problem in Tor has seen much attention in the literature. Prior Tor security analyses often consider entropy

  • r similar statistical measures as metrics of the security provided

by the system at a static point in time. In addition, while prior metrics of security may provide useful information about overall usage, they typically do not tell users how secure a type of behav- ior is. Further, similar previous work has thus far only considered adversaries that control either a subset of the members of the Tor

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services

Albert Kwon†, Mashael AlSabah‡§†∗, David Lazar†, Marc Dacier‡, and Srinivas Devadas†

†Massachusetts Institute of Technology, {kwonal,lazard,devadas}@mit.edu ‡Qatar Computing Research Institute, mdacier@qf.org.qa §Qatar University, malsabah@qu.edu.qa

This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break the anonymity of hidden service clients and operators pas- sively. In particular, we show that the circuits, paths established through the Tor network, used to commu- nicate with hidden services exhibit a very different be- havior compared to a general circuit. We propose two attacks, under two slightly different threat models, that As a result, many sensitive services are only accessi- ble through Tor. Prominent examples include human rights and whistleblowing organizations such as Wik- ileaks and Globalleaks, tools for anonymous messag- ing such as TorChat and Bitmessage, and black markets like Silkroad and Black Market Reloaded. Even many non-hidden services, like Facebook and DuckDuckGo, recently have started providing hidden versions of their

slide-11
SLIDE 11

Related work

Privacy Scalability Tor Dissent [OSDI 2012] Riposte [Oakland 2015] Pond

slide-12
SLIDE 12

Contribution

Privacy Scalability Tor Vuvuzela Dissent [OSDI 2012] Riposte [Oakland 2015] Pond

slide-13
SLIDE 13

Contribution

  • Vuvuzela: the first private messaging system that hides

metadata from powerful adversaries for millions of users

  • Vuvuzela scales linearly with the number of users
  • Differential privacy for millions of messages per user

for one million users

  • 37s end-to-end message latency
  • 60,000 messages / second throughput
  • Good match for private text-based messaging
slide-14
SLIDE 14

Vuvuzela overview

  • Handful of servers arranged in a chain
  • Users send/receive messages through

the first server

Bob Alice Charlie

Server 1 Server 2 Server 3

  • Last server decides who gets

what messages and sends them back down the chain

slide-15
SLIDE 15

Vuvuzela’s two protocols

Dialing protocol:

Initiate conversation session between two users

Bob Alice Charlie

Conversation protocol:

Exchange messages between two users

slide-16
SLIDE 16

Threat model

Bob Alice Charlie

  • All users might be malicious

(besides you and your friends)

  • PKI: users know each other’s keys
  • All but one server are compromised
  • Adversary is active (can knock users
  • ffline, tamper with messages, etc)
slide-17
SLIDE 17

Metadata privacy

Bob Alice Charlie Bob Alice Charlie Bob Alice Charlie Vuvuzela Vuvuzela Vuvuzela

Scenario 1 Scenario 2 Scenario 3

slide-18
SLIDE 18

Metadata privacy

Bob Alice Charlie Bob Alice Charlie Bob Alice Charlie Vuvuzela Vuvuzela Vuvuzela

Scenario 1 Scenario 2 Scenario 3

traffic analysis hacked servers

47D1FC9A…

? ? ?

slide-19
SLIDE 19

Approach to scalable privacy

  • Use efficient cryptography to encrypt as much

metadata as possible.

  • Add noise to metadata that we can’t “encrypt.”
  • Use differential privacy to reason about how much

privacy the noise gives us.

slide-20
SLIDE 20

Dead drops prevent users from talking directly

Bob Alice Charlie

Dead drop: a place to leave a message that another user can pick up

slide-21
SLIDE 21

Talking via dead drops

Bob Alice Charlie

Dead drop: zzp8ns0nrxt3g9efb6c Message: “Hi Bob! How’s it going?” Dead drop: zzp8ns0nrxt3g9efb6c Message: “”

slide-22
SLIDE 22

Conversation protocol

Bob Alice Charlie

Dead drop: zzp8ns0nrxt3g9efb6c Message: “Hi Bob! How’s it going?” Dead drop: zzp8ns0nrxt3g9efb6c Message: “”

1 Round

slide-23
SLIDE 23

Conversation protocol

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : “ ” D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : “ I ’ m g

  • d

, t h a n k s ! ”

2 Round

slide-24
SLIDE 24

Conversation protocol

Bob Alice Charlie

3 Round

slide-25
SLIDE 25

Conversation protocol

Bob Alice Charlie

4 Round

slide-26
SLIDE 26

Messages are encrypted

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j …

slide-27
SLIDE 27

Idle clients send cover traffic

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j …

slide-28
SLIDE 28

Idle clients send cover traffic

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…

slide-29
SLIDE 29

Dead drops give privacy

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…

slide-30
SLIDE 30

Bob Alice Charlie

D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : W C z d j L 5 w B N p J U t t 9 t E 7 … D e a d d r

  • p

: F s d d 5 v P M L H 3 K A R q E 2 a M e s s a g e : y j T 1 Q W s V k 8 q W 4 u P 6 g E j … Dead drop: uy06ZOuTTvrERU7rCh Message: JwXpDGH5reB627KOs0…

Dead drops give privacy

slide-31
SLIDE 31

Mixnet hides origin of messages

Bob Alice Charlie

slide-32
SLIDE 32

Mixnet hides origin of messages

Bob Alice Charlie

A B C

slide-33
SLIDE 33

Mixnet hides origin of messages

Bob Alice Charlie

A B C

slide-34
SLIDE 34

Mixnet hides origin of messages

Bob Alice Charlie

A B C

slide-35
SLIDE 35

Are we done yet?

Bob Alice Charlie

2 1

slide-36
SLIDE 36

Are we done yet?

Bob Alice Charlie

2 1 Challenge: dead drop counts reveal access patterns

slide-37
SLIDE 37

Demo!

Let’s see why access counts are a problem.

slide-38
SLIDE 38

Solution: Each server adds noise

Bob Alice Charlie

1 2 1 1 2

Fake exchanges (noise)

slide-39
SLIDE 39

What is noise?

Dead drop: 3nPki8GbZWfXRyw61wk Message: nE7yvLJLeiCvcD1Cu62… Dead drop: 3nPki8GbZWfXRyw61wk Message: 4QjdRfoB7GoEEb0vtMjf… Dead drop: kt2JnceRb7ieU3M1k5Oj Message: mb4ZgDABTLTtm9rUZzV… Dead drop: kt2JnceRb7ieU3M1k5Oj Message: wYNxuyoOiP9Ffjr4LKtv38… Dead drop: RY9VjW4XROtTcbnZPaJ Message: Bzizd2loCIeXdIfHU33mds… Dead drop: LWnyE3AB2TTmUcCGL Message: k1bVsoTVlJQTEy92Vxd1o… Dead drop: LWnyE3AB2TTmUcCGL Message: mTLa2cdkKgzADt0oJm8s… Dead drop: t53c81TtFdmBCzFLQ7Q Message: rCCnMCttJ8C8JMthLxN8… Dead drop: pavnHQmuegSmvXz6Y5 Message: IuA94shFx7okpZdBacjBg…

Fake singles Fake doubles

slide-40
SLIDE 40

Demo!

Vuvuzela with noise is effective!

slide-41
SLIDE 41

Formalizing privacy guarantee

Bob Alice Vuvuzela

𝜻 × Pr[ i | not Alice talked to Bob]

Pr[ i | Alice talked to Bob]

Bob Alice Vuvuzela

slide-42
SLIDE 42

(𝜁,𝜀) differential privacy, simplified

Bob Alice Vuvuzela

𝜻 × Pr[ i | not Alice talked to Bob]

Pr[ i | Alice talked to Bob]

Bob Alice Vuvuzela

slide-43
SLIDE 43

Noise achieves DP

  • Let d be the number of dead drops with two

accesses in a single round.

  • To make d differentially private, we need to make

these distributions very close (indistinguishable):

Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]

250 Probability Dead drops with two messages 1 Probability Dead drops with two messages

slide-44
SLIDE 44

Generating this distribution

250 Probability Dead drops with two messages

Constraints:

  • Can’t have negative dead drops
  • Distributions have to be close enough for

differential privacy

Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]

slide-45
SLIDE 45

Generating this distribution

250 Probability Dead drops with two messages

Constraints:

  • Can’t have negative dead drops
  • Distributions have to be close enough for

differential privacy

Average noise is hundreds of fake messages

Pr[ d=x | Alice talked to Bob] Pr[ d=x | not Alice talked to Bob]

slide-46
SLIDE 46

Privacy degrades every round

  • Each round leaks metadata
  • We want differential privacy after sending many messages
  • This means adding more noise to support more messages.
slide-47
SLIDE 47

Vuvuzela’s approach to noise

  • More noise means privacy for more messages.
  • Add as much noise as possible, while still keeping the

system practical.

  • Use differential privacy to compute how much privacy

users get.

  • Using composition theorem [Dwork & Roth 2014]
  • We picked: 300,000 fake singles and 300,000 fake

doubles per server per round.

slide-48
SLIDE 48

Privacy with 300,000 noise

1 2 3 4 5 6 7 8 9 10,000 100,000 1M 2M

  • Messages Alice wants to keep private

Pr[ i | Alice talked to Bob] ≤ 𝜻 × Pr[ i | not Alice talked to Bob]

slide-49
SLIDE 49

Eve is very evil

  • Alice sees previous graph and sends Eve many

messages through Vuvuzela.

  • Will NSA arrest Alice for talking to Eve?
  • Probably: using Vuvuzela is already suspicious
  • Will a fair jury convict Alice of talking to Eve?
  • Unlikely: Vuvuzela observations are not damning

evidence!

slide-50
SLIDE 50

Alice gets a fair trial

  • Jury is already 50% certain Alice did the crime

(NSA is intimidating, other evidence, etc)

  • Beyond unreasonable doubt = 90% certainty
slide-51
SLIDE 51

Alice is innocent for millions

  • f messages

50 67 75 80 83 86 88 89 90 10,000 100,000 1M 2M Jury certainty % Messages Alice wants to keep private

slide-52
SLIDE 52

Implementation

  • 3,000 lines of Go
  • Untrusted entry server manages user connections
  • Entry server notifies clients when a new round

starts

  • Available soon on Github:
  • github.com/davidlazar/vuvuzela
slide-53
SLIDE 53

Evaluation

  • Can Vuvuzela servers support a large number of

users and messages?

  • Does Vuvuzela provide acceptable performance?
slide-54
SLIDE 54

Asymptotic performance

  • Noise is independent of number of users.
  • Performance is linear in number of users
  • Bandwidth, latency, CPU
slide-55
SLIDE 55

Setup

Client VMs Entry server Server 1 Server 2 Server 3

36 cores per VM 10 Gbps links

slide-56
SLIDE 56

Acceptable end-to-end latency for text messaging

0 s 10 s 20 s 30 s 40 s 50 s 60 s 10 500,000 1M 1.5M 2M End-to-end latency for conversation messages Number of online users

slide-57
SLIDE 57

Performance bottlenecks

  • CPU bound
  • Dominated by mixnet operations
  • High bandwidth cost
  • 166 MB/s for servers, 12 KB/s for clients
  • Can lower bandwidth by increasing latency

linearly

slide-58
SLIDE 58

Conclusion

  • Problem: hide metadata in a secure and scalable way.
  • Approach:
  • Encrypt as much metadata as possible.
  • Add noise to obscure remaining metadata.
  • Formalized privacy guarantee with differential privacy
  • Vuvuzela: scalable private messaging without metadata
  • Scales linearly with number of users
  • Privacy for millions of messages per user → 37s latency
  • 60,000 messages / second of throughput
slide-59
SLIDE 59

What happens after 2M?

  • Privacy for lifetime of messages is unrealistic under this configuration
  • User’s should change their expectation to just expect privacy for a subset
  • f messages
  • Example: privacy just for important messages.
  • Example: privacy just for recent messages.
  • User does not need to specify which subset of messages to keep private
  • Vuvuzela’s guarantee holds for any (small) subset of messages that

the adversary cares about