survey of network anonymisation techniques 34th chaos
TRANSCRIPT
![Page 1: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/1.jpg)
How Alice and Bob meet if they don’t like onionsSurvey of Network Anonymisation Techniques
Erik Sy
34th Chaos Communication Congress, Leipzig
![Page 2: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/2.jpg)
Agenda
1. Introduction to Anonymity NetworksAnonymityStrategies Towards AnonymityAdversaries
2. Anonymous Communication NetworksI2PFreenetGNUnetJonDonym
3. Research Work
4. Conclusion
2
![Page 3: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/3.jpg)
Anonymity
Anonymity is the state of being not identifiable within a set of subjects, the an-onymity set. Andreas Pfitzmann
3
![Page 4: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/4.jpg)
Sender Anonymity
The sender may be anonymous only within a set of potential senders.4
![Page 5: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/5.jpg)
Recipient Anonymity
The recipient may be anonymous only within a set of potential recipients.5
![Page 6: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/6.jpg)
Sender Recipient Anonymity
6
![Page 7: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/7.jpg)
Unlinkability
Unlinkability of two or more items of interest from an attacker’s perspectivemeans that within the system, the attacker cannot sufficiently distinguish whe-ther these subjects are related or not. Pfitzmann, Hansen
7
![Page 8: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/8.jpg)
Relationship Anonymity
Alice can be linked to Bob.8
![Page 9: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/9.jpg)
Relationship Anonymity
Alice cannot be linked to Bob.
Traffic analysis• pattern in size of packets• pattern in timing of
packets• content of messages• ...
9
![Page 10: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/10.jpg)
Who do you trust?
![Page 11: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/11.jpg)
Strategies Towards Anonymity
• Cover traffic• Broadcasting messages• Trusted third party (VPN, Proxy)• Shuffling and delaying of messages (mix, anonymous remailer)• Anonymity systems that distribute trust
– Secure multi-party computation (DC-Nets)– Cascades of mixes– Onion routing– Garlic routing– ...
11
![Page 12: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/12.jpg)
One-hop Mix
12
![Page 13: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/13.jpg)
Onion Routing
13
![Page 14: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/14.jpg)
Garlic Routing
• Peer-to-peer• Uni-directional channels• Messages can be
bundled• Uses layers of encryption
14
![Page 15: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/15.jpg)
Adversaries
![Page 16: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/16.jpg)
External Adversary
16
![Page 17: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/17.jpg)
Internal Adversary
17
![Page 18: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/18.jpg)
Passive Adversary
18
![Page 19: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/19.jpg)
Active Adversary
19
![Page 20: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/20.jpg)
Local Adversary
20
![Page 21: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/21.jpg)
Global Adversary
21
![Page 22: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/22.jpg)
Anonymous Communication Networks
![Page 23: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/23.jpg)
Anonymous Communication Networks (ACNs)
• Many defunct, unimplemented or unavailable networks exist– Conflux– MorphMix– Herbivore– . . .
• We selected a few implemented and usable networks:– JonDonym– Freenet– I2P
• Some research projects:– Vuvuzela– Loopix– AN.ON-Next
23
![Page 24: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/24.jpg)
I2P
• Low-latency peer-to-peer network of 70 000 nodes• Focuses on Hidden Services with few outproxies• I2P applications
– P2P applications– Web browsing– Email, instant messaging, and IRC– File storage
• Actively developed with releases every two months Itoopie
24
![Page 25: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/25.jpg)
How Alice and Bob meet on I2P with Garlic Routing
Alice Bob
OutboundTunnel
OutboundTunnel
InboundTunnel
InboundTunnel
• Encryption layers areadded/removed along thepath• Alice sends messages
towards Bob’s entry pointof the inbound tunnel• Lifetime of a tunnel is
limited to 10 minutes
25
![Page 26: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/26.jpg)
I2P – How does Alice build her tunnels?
• Loads an initial set of active peers from public sources (bootstrapping)• Collects a local statistic about all seen routers• Exploratory tunnels are used to build, manage and destroy other tunnels• Selects set of well performing seen routers for tunnel establishment• Sends tunnel construction request over exploratory tunnel to chosen peers• If peer accepts request, then symmetric keys and successor address are exchanged
26
![Page 27: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/27.jpg)
I2P – How does Alice get the contact information of Bob?
• Every peer is uniquely identified by the routerInfo data structure containing publickey, identifier, and contact information of the peer• Super-peers store routerInfo for every peer in a distributed hash table (netDB)• For offered services the entry points of the inbound tunnels (leaseSets) are also
stored in netDB• I2P protects the information which peer operates a certain service• With previous knowledge about Bob, his routerInfo or leaseSet can be retrieved
from the netDB
27
![Page 28: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/28.jpg)
Freenet
• Peer-to-peer network of 10 000 nodes• Focuses on distributed information storage• Actively developed since 2001• Optional friend-to-friend topology• Applications:
– File storage– Static Web pages– Chat, Email, Social
28
![Page 29: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/29.jpg)
Freenet – How Alice and Bob meet
29
![Page 30: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/30.jpg)
Freenet – How Alice and Bob meet
29
![Page 31: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/31.jpg)
Freenet – How Alice and Bob meet
29
![Page 32: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/32.jpg)
GNUnet
• Foundation for an alternative network stack• Primary application: file sharing• Similar to Freenet, but with economically inspired
trust model– Depending on a relay’s load, messages are
forwarded to zero or more nodes– Users can trade anonymity for efficiency
• Optional friend-to-friend topology
30
![Page 33: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/33.jpg)
GNUnet – Trading Anonymity for Efficiency
Nodes may indirect traffic by replacing reply addresses (→cover traffic). . .. . . or forward traffic without rewriting reply addresses (→preserve bandwidth)31
![Page 34: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/34.jpg)
JonDonym – Overview
• Focuses on legacy Internet• Developed as part of research project AN.ON
– formely known as Java Anon Proxy• Mix-based ACN
– Two (free) or three (premium) hops per cascade– Mix operators are known
• 5000 paying users
32
![Page 35: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/35.jpg)
JonDonym – Network Architecture
33
![Page 36: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/36.jpg)
JonDonym – Censorship Circumvention
34
![Page 37: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/37.jpg)
JonDonym – Censorship Circumvention
34
![Page 38: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/38.jpg)
JonDonym – Payment
Billing methods paysafecard, Bitcoin, bank transfer, cash by mail, . . .
35
![Page 39: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/39.jpg)
Comparison of Anonymity Systems
• Threat model– None of these ACNs protects against a global, passive observer– Each ACN has some tolerance against internal, local and active adversaries– GNUnet and Freenet protect hosts in case of identification with plausible
deniability• Use Cases
– Sender anonymity in legacy Internet with Tor, JonDonym and partially I2P– Hidden Services with Tor, I2P, Freenet and GNUnet– Files remain online after publisher goes offline with Freenet and GNUnet– Anonymous file sharing with I2P, Freenet, GNUnet and partially Tor
36
![Page 40: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/40.jpg)
Comparison of Anonymity Systems
• Provider model– Relays are run by volunteers (Tor)– Relay operators are approved by provider (JonDonym)– Every peer is a relay for others (I2P, Freenet, GNUnet)
• Usability, size of anonymity set, active community– Tor seems to be considerably better in these categories
37
![Page 41: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/41.jpg)
Research Work
AN.ON-Next Vuvuzela Loopix
![Page 42: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/42.jpg)
AN.ON-Next
• Ongoing research project• Zero-effort privacy
– Relaxed attacker model– Trust in ISP– Shuffling of IPv6 addresses
• JonDonym 2.0– Low-latency MIXnet
39
![Page 43: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/43.jpg)
Vuvuzela
• MIXnet hides origin of messages• Noise obscures metadata• Scales with number of users
40
![Page 44: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/44.jpg)
Loopix
• Mixnet-based anonymous communication system• Makes use of cover traffic• Sender determines a delay for messages in the mixes• Aims to resist powerful adversaries such as global passive observer and active
attacker• Security goals
– Sender-receiver third-party unlinkability– Sender online unobservability– Receiver unobservability
41
![Page 45: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/45.jpg)
Conclusion
• Tor is good but not alone• There is no practical anonymity systems that resists a global passive observer• There is no anonymity without security
– Test system– Report bugs– Send patches
• Your participation in these networks protects your privacy and the one of others
42
![Page 46: Survey of Network Anonymisation Techniques 34th Chaos](https://reader033.vdocuments.us/reader033/viewer/2022061101/629ba4fbf8cea0009a1cdd9a/html5/thumbnails/46.jpg)
How Alice and Bob meet if they don’t like onionsSurvey of Network Anonymisation Techniques
Erik Sy
34th Chaos Communication Congress, Leipzig