online anonymity beyond tor

42
Online Anonymity beyond Tor Dr. Marn Schmiedecker

Upload: sba-research

Post on 21-Jan-2018

433 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Online Anonymity beyond Tor

Online Anonymitybeyond TorDr. Mar�n Schmiedecker

Page 2: Online Anonymity beyond Tor

Outline

Online Anonymity

Tor

Alterna�ves to Tor

Interes�ng Times Ahead

2/38

Page 3: Online Anonymity beyond Tor

Online Anonymity

Page 4: Online Anonymity beyond Tor

Online Anonymity

3/38

Page 5: Online Anonymity beyond Tor

Online Anonymity

4/38

Page 6: Online Anonymity beyond Tor

Anonymity Set

• Anonymity requires a peer group/set• Well-defined group of individuals• The bigger the be�er

”Anonymity is the state of being not iden�fiable within a set ofsubjects, the anonymity set.” [Pfitzmann, 2000]

5/38

Page 7: Online Anonymity beyond Tor

Anonymity Set

6/38

Page 8: Online Anonymity beyond Tor

Degrees Of Anonymity

• Pseudonymity• Sender/Recipient anonymity:

◦ Sender/Recipient of a message cannot be determined• Unlinkability:

◦ Messages cannot be a�ributed to a pair of users• Unobservability:

◦ Cannot be determined if specific user sent messages at all

7/38

Page 9: Online Anonymity beyond Tor

Chaum Mix

• Base of modern anonymity systems• David Chaum: ”Untraceable electronic mail, returnadresses, and digital pseudonyms”, Communica�ons ofthe ACM, 1981

• Chaum Mix◦ Order of sent messages != order of received messages◦ Messages are split into equal chunks and padded◦ Hinders de-anonymiza�on based on analyzing the network

traffic

8/38

Page 10: Online Anonymity beyond Tor

One-hop mix

Figure: Basic Mix, George Danezis, UCL 9/38

Page 11: Online Anonymity beyond Tor

Chaum mix proper�es

• unlinkability: use of cryptography, message chunking• traffic analysis: reordering of messages

10/38

Page 12: Online Anonymity beyond Tor

Broken Mix: no reordering but FIFO

Figure: FIFO Mix, George Danezis, UCL

A�ackers can link senders to recipients by observing the mix. 11/38

Page 13: Online Anonymity beyond Tor

Protec�on against traffic analysis

Figure: Mix Batching / Pooling, George Danezis, UCL

Threshold sends all messages once certain number ofmessages reached (Chaum), pooling: some messages are keptback.

12/38

Page 14: Online Anonymity beyond Tor

Tor

13/38

Page 15: Online Anonymity beyond Tor

Tor

14/38

Page 16: Online Anonymity beyond Tor

Tor

15/38

Page 17: Online Anonymity beyond Tor

Tor

16/38

Page 18: Online Anonymity beyond Tor

Tor

17/38

Page 19: Online Anonymity beyond Tor

TorNSA: Tor = King of Anonymity1

• “S�ll the King of high secure, low latency InternetAnonymity”

• no new a�ack found in these files• but: Tor users can be tagged• some of the files by the NSA on Tor:http://media.encrypted.cc/files/nsa/

1http://www.theguardian.com/world/2013/oct/04/

nsa-gchq-attack-tor-network-encryption18/38

Page 20: Online Anonymity beyond Tor

Alterna�ves to Tor

Page 21: Online Anonymity beyond Tor

Garlic Rou�ng

• Founda�on of the Invisible Internet Project (I2P)• Layer-based encryp�on

◦ Basic idea: Chaum mixes / Onion Rou�ng• Messages are bundled

◦ Messages are merged into Bulbes/Cloves• ElGamal/AES + SessionTag

◦ Combina�on of asymmetric and symmetric encryp�on methods

19/38

Page 22: Online Anonymity beyond Tor

Example Garlic Rou�ng: I2P

• Based on Java, ac�ve development since 2003• I2P Router creates local proxy (4444/TCP)• I2P Applica�ons

◦ Filesharing (BitTorrent, eMule, Gnutella)◦ E-Mail (Postman, I2P-Bote)◦ Instant messaging (I2P Messenger)◦ Publishing (Syndie)◦ Distributed file-system/storage (Tahoe-LAFS)

20/38

Page 23: Online Anonymity beyond Tor

Garlic Rou�ng: I2P

• Tunnels to other I2P nodes are created(incoming / outgoing tunnels)

• Use focuses on “Darknet“ applica�ons (as opposed to Tor)

21/38

Page 24: Online Anonymity beyond Tor

Anonymity systems overview

22/38

Page 25: Online Anonymity beyond Tor

Interes�ng Times Ahead

Page 26: Online Anonymity beyond Tor

OTR, Signal and more

• key protocol for (un-)authen�cated encryp�on• OTR, mpOTR, axolotl• part of Signal, Whatsapp, Wire• open libraries available• forward secrecy

23/38

Page 27: Online Anonymity beyond Tor

Ricochet

• builds on Tor2

• spawns hidden service• allows for anonymous cha�ng• no party has to reveal iden�ty• implicitly authen�cated

2https://ricochet.im24/38

Page 28: Online Anonymity beyond Tor

HORNET (2015) [1]

• onion-rou�ng on the network layer• no local states• all relevant informa�on in headers• only symmetric cryptography• can achieve close to 100 Gbit/s

25/38

Page 29: Online Anonymity beyond Tor

Dissent (2012) [2]

• provable privacy• (groups of) client-server• based on DC-net shuffles• anytrust, one honest server needed• more efficient as DC-nets (linear!)• trade-offs: intersec�on a�acks, scalability

26/38

Page 30: Online Anonymity beyond Tor

Riffle (2016) [3]

• improves Dissent• can handle many more clients• efficient symmetric crypto• bandwidth propor�onal to messages

27/38

Page 31: Online Anonymity beyond Tor

Aqua (2013) [4]

• Tor-like infrastructure• mix-based• each client has one edge mix• k-anonymity among k honest clients

28/38

Page 32: Online Anonymity beyond Tor

Vuvuzela (2015) [5]

• uses differen�al privacy• scales to millions of users• hides most metadata• onion-like relaying• s�ll somewhat efficient

29/38

Page 33: Online Anonymity beyond Tor

Alpenhorn (2016) [6]

• protocol for ini�a�ng communica�on• employs forward secrecy (key ratchet)• uses iden�ty-based encryp�on• added to Vuvuzela

30/38

Page 34: Online Anonymity beyond Tor

Riposte (2015) [7]

• usable for broadcas�ng• few writers, many readers• provable privacy (reverse PIR)• protects against traffic analysis

31/38

Page 35: Online Anonymity beyond Tor

Loopix (2017) [8]

• sender- and receiver anonymity• unobservability!• traffic analysis resistance against a global network

adversary!• mix-based, very low latency

32/38

Page 36: Online Anonymity beyond Tor

To conclude

• Tor leads the way• DC-nets vs. mixes• much more to come

33/38

Page 37: Online Anonymity beyond Tor

Ques�ons?

Page 38: Online Anonymity beyond Tor

References I[1] Chen Chen, Daniele E Asoni, David Barrera, George

Danezis, and Adrain Perrig.Hornet: High-speed onion rou�ng at the network layer.In Proceedings of the 22nd ACM SIGSAC Conference onComputer and Communica�ons Security, pages 1441–1454.ACM, 2015.

[2] David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford,and Aaron Johnson.Dissent in numbers: Making strong anonymity scale.In 8th USENIX Symposium on Opera�ng Systems Designand Implementa�on, pages 179–182, 2012. 34/38

Page 39: Online Anonymity beyond Tor

References II[3] Albert Kwon, David Lazar, Srinivas Devadas, and Bryan

Ford.Riffle.Proceedings on Privacy Enhancing Technologies,2016(2):115–134, 2016.

[4] Stevens Le Blond, David Choffnes, Wenxuan Zhou, PeterDruschel, Hitesh Ballani, and Paul Francis.Towards efficient traffic-analysis resistant anonymitynetworks.In ACM SIGCOMM Computer Communica�on Review,volume 43, pages 303–314. ACM, 2013. 35/38

Page 40: Online Anonymity beyond Tor

References III

[5] Jelle Van Den Hooff, David Lazar, Matei Zaharia, andNickolai Zeldovich.Vuvuzela: Scalable private messaging resistant to trafficanalysis.In Proceedings of the 25th Symposium on Opera�ngSystems Principles, pages 137–152. ACM, 2015.

[6] David Lazar and Nickolai Zeldovich.Alpenhorn: Bootstrapping secure communica�on withoutleaking metadata.

36/38

Page 41: Online Anonymity beyond Tor

References IV

In Proceedings of the 12th Symposium on Opera�ngSystems Design and Implementa�on (OSDI), Savannah, GA,2016.

[7] Henry Corrigan-Gibbs, Dan Boneh, and David Mazieres.Riposte: An anonymous messaging system handlingmillions of users.In Security and Privacy (SP), 2015 IEEE Symposium on,pages 321–338. IEEE, 2015.

37/38

Page 42: Online Anonymity beyond Tor

References V

[8] Ania Piotrowska, Jamie Hayes, Tariq Elahi, Sebas�anMeiser, and George Danezis.The loopix anonymity system.arXiv preprint arXiv:1703.00536, 2017.

38/38