forensic dead-ends: tracing anonymous remailer abusers len sassaman the shmoo group [email protected]

36
Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group [email protected]

Upload: carmel-foster

Post on 18-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Forensic Dead-Ends:Tracing Anonymous Remailer Abusers

Len SassamanThe Shmoo [email protected]

Page 2: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

What is Anonymity?

Page 3: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Network anonymity services

• Shield the identity of the user

• Conceal other identifying factors

• Dissociate users’ actions with identity

• Do not conceal that those actions occur!

• Anonymity != privacy

Page 4: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Why Anonymity on the Internet is Necessary

Page 5: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Why people use remailers

• Whistle blowing

• Discussion of personal or taboo issues

• Journalistic correspondence

• Spam protection

• Future anonymity

• Political speech

• Censorship avoidance

Page 6: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Why people operate remailers

• Belief in the right to anonymity

• Necessity of remailer network

• Certainty of uncompromised remailer

• Exercise applied Cypherpunk technology

Page 7: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Corporate uses

• Research of competitors

• Avoidance of information leakage

• Thwarting industrial espionage

• Employee feedback

Page 8: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Commercial anonymity

• Reasons why selling anonymity is difficult– Payment collection (no anonymous cash!)– Cost of operating service– Need for a large anonymity set– Uncertain demand– Legal restrictions– Abuse complications

Page 9: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Commercial anonymity

• Reasons why buying anonymity is difficult– Payment rendering (no anonymous cash!)– Uncertainty of anonymity strength– Availability of service– Local network restrictions– Ease of use

Page 10: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Types of Anonymity on the Internet

Page 11: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Weak anonymity

• Protection from the casual attacker

• Spam avoidance

• Anonymous online forums

Page 12: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Strong anonymity

• Protection from ISP snooping

• Protection from government monitoring

• Protection in the case of server compromise (hacker-proofing)

Page 13: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Examples

• Free web mail accounts

• SSL anonymous proxies

• Anonymous ISPs

• Anonymous mail relays

• Mix-net remailer systems

Page 14: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

History of strong remailers

• anon.penet.fi

• Cypherpunk remailers (Type 1)

• Mixmaster remailers (Type II)

• Zero Knowledge Freedom mail

• Mixminion (Type III -- forthcoming)

Page 15: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

The Mechanics of Strong Anonymity

Page 16: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

David Chaum’s mix-nets

• Multi-layered encyption chains

• indistinguishable message packets

• Random reordering at each hops

• Return address reply blocks

Page 17: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Mixmaster

• A mix-net implimentation

• Clients available for Windows, Macintosh, Unix

• Servers available for Unix and Windows

• Low hardware resource requirements

• Reliable network connection

• Mail server capabilities

Page 18: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

A Mixmaster Packet

Page 19: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Journey of a mixed message

• Chain selection

• Encryption

• Padding/splitting

• Transmission

• What an all-seeing observer would know

• Importance of a large anonymity set

• Cover traffic

Page 20: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Flaws in Mixmaster

• Tagging attacks

• Flooding attacks

• Key compromise

• Need for forward secrecy

• Reliability failings

• Ease of use

• Lack of return address capability

Page 21: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Inside a Mixmaster Remailer

Page 22: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Walk-through of a live system

• Remailer program location

• Mail handling

• Remailer packet handling

• Logging

• Abuse processing

Page 23: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Types of Abuse

Page 24: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Spam

• Remailers are ill-suited for email spam

• High latency, easy detection

• Open-relays are much better

• Usenet spam is still a problem

Page 25: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Piracy

• Most remailers block binary transfers

• Anonymity is decreased by sending large, multi-packet messages

• Email is a poor medium for file transfer

• Throw-away shell/ftp accounts, irc, and p2p systems are more popular for warez

Page 26: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Targeted harassment

• Directed abusive messages at individuals

• Floods from one or more remailers

• Usenet flames

Page 27: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Remailers and terrorism

• Media hype

• Immediate increase in # of remailers

• Political opinion of anonymity

• Remailers: Tools against terror

• What about public libraries?

Page 28: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Getting around the Remailer Dead-End

Page 29: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Means of tracking abusers

• Seizing remailer servers won’t work• Snooping traffic will reveal little• Carnivore not very useful• Flooding/tagging won’t work after the fact (if at

all)• Honeypot remailers and chain manipulation• Literary forenics• Side-channel leakage

Page 30: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Stopping abuse

• Individual remailer block-lists

• The Remailer Abuse Blacklist– http://www.paracrypt.com/remailerabuse/

• Local filtering

• Do not need to know the ID of abuser

• Ways to avoid being a target of abuse

• Spam and flood detection tools for remops

Page 31: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Information an Anonymity Service Provider is Able to Reveal

Page 32: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

The downfall of anon.penet.fi

• What Penet couldn’t provide

• Scientology vs. The Internet

• Why Julf Helsingius closed anon.penet.fi

• http://www.penet.fi/press-english.html

Page 33: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Why remops don’t keep logs

• Disk space / resource drain

• Local user privacy concerns

• Not useful for abuse investigations

Page 34: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

“Black-bagging a remailer”

• Only the last hop is usually known

• No logs

• No chain information

• Keys aren’t useful in last hop

• All chained hops are needed

• START-TLS forward secrecy

• Future message compromise potential

Page 35: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Asking for help

• What to ask a remop when investigating abuse

• What will encourage a remop to be helpful

• What will discourage a remop

• Personal experiences

Page 36: Forensic Dead-Ends: Tracing Anonymous Remailer Abusers Len Sassaman The Shmoo Group rabbi@shmoo.com

Comments

Len Sassaman

[email protected]