66
A Survey Anonymity and Anonymous File-Sharing Tom Chothia (Joint work with Konstantinos Chatzikokolakis)

A Survey Anonymity and Anonymous File-Sharing

  • Upload
    pooky

  • View
    61

  • Download
    0

Embed Size (px)

DESCRIPTION

A Survey Anonymity and Anonymous File-Sharing. Tom Chothia (Joint work with Konstantinos Chatzikokolakis). Outline of Talk. The theory of anonymity. Designs for anonymity. Anonymous file-sharing software. Some early results from the analysis of file-sharing software. Introduction. - PowerPoint PPT Presentation

Citation preview

Page 1: A Survey Anonymity and Anonymous File-Sharing

A Survey Anonymity and Anonymous File-Sharing

Tom Chothia

(Joint work with Konstantinos Chatzikokolakis)

Page 2: A Survey Anonymity and Anonymous File-Sharing

Outline of Talk

• The theory of anonymity.

• Designs for anonymity.

• Anonymous file-sharing software.

• Some early results from the analysis of file-sharing software.

Page 3: A Survey Anonymity and Anonymous File-Sharing

Introduction

• This is a light weight introduction to anonymity:– Definitions– Design– Real Systems– Some Analysis of the Systems

• Next week you will see more on the technical definitions and modeling with process calculi.

Page 4: A Survey Anonymity and Anonymous File-Sharing

The Theory of Anonymity

Anonymity means different things to different users.

The right definitions are key to understand any system.

“On the Internet nobody knows you’re a dog”

Page 5: A Survey Anonymity and Anonymous File-Sharing

The Theory of Anonymity

• Anonymity is a difficult notion to define.– Systems have multiple agents– which have different views of the system– and wish to hide different actions– to variable levels.

• Sometimes you just want some doubt, sometimes you want to act unseen.

Page 6: A Survey Anonymity and Anonymous File-Sharing

The Theory of Anonymity

• In a system of anonymous communication you can be: – A sender– A receive / responder– A helpful node in the system– An outsider (who may see all or just some of the

communications).

• We might want anonymity for any of these, from any of these.

Page 7: A Survey Anonymity and Anonymous File-Sharing

Example: Anonymous File-Sharing

One node sends a request for a file (sender)

Other nodes receive this request (the nodes)

Maybe one of the nodes replies with a file (receiver/responder).

The attacker may be any of these or an outside observer.

?

Page 8: A Survey Anonymity and Anonymous File-Sharing

Example: Anonymous File-Sharing

• The user may wish to hide – that they are offering files– that they are taking part in

data transfer– that they are running the

software at all.

• The user may want to have plausible deniability or go complete unnoticed.

?

Page 9: A Survey Anonymity and Anonymous File-Sharing

The Theory of Anonymity

• There are many definitions.

• Some are “too weak”, – Delov-Yao style “Provable Anonymity”

• Some are “too strong”, – Information flow.

• There will be more on these definitions next week.

Page 10: A Survey Anonymity and Anonymous File-Sharing

Levels of Anonymity

Reiter and Rubin provide the classification:

• Beyond suspicion: the user appears no more likely to have acted than any other.

• Probable innocence: the user appears no more likely to have acted than to not to have.

• Possible innocence: there is a nontrivial probability that it was not the user.

Page 11: A Survey Anonymity and Anonymous File-Sharing

Beyond suspicion

• All users are Beyond suspicion:

Prob

Users

A B C D E

Page 12: A Survey Anonymity and Anonymous File-Sharing

Beyond suspicion

• Only B and D are Beyond suspicion:

Prob

Users

A B C D E

Page 13: A Survey Anonymity and Anonymous File-Sharing

Beyond suspicion

• Now, only B is Beyond suspicion:

Prob

Users

A B C D E

Page 14: A Survey Anonymity and Anonymous File-Sharing

Probable Innocence

• All users are Probably Innocence

Prob

Users

A B C D E

50%

Page 15: A Survey Anonymity and Anonymous File-Sharing

Probable Innocence

• All users are Probably Innocence

Prob

Users

A B C D E

50%

Page 16: A Survey Anonymity and Anonymous File-Sharing

Probable Innocence

• All users are Probably Innocence

Prob

Users

A B C D E

50%

Page 17: A Survey Anonymity and Anonymous File-Sharing

Probable Innocence

• All users are Probably Innocence

Prob

Users

A B C D E

50%

Page 18: A Survey Anonymity and Anonymous File-Sharing

Probable Innocence

• All users are Probably Innocence

Prob

Users

A B C D E

50%

Page 19: A Survey Anonymity and Anonymous File-Sharing

Example: The Anonymizer

An Internet connection reveals your IP number.

The Anonymizer promise

“Anonymity”

Connection made via The Anonymizer.

The Server see only the Anonymizer.

S

?

The Anonymizer

Page 20: A Survey Anonymity and Anonymous File-Sharing

Example: The Anonymizer

The sender is Beyond Suspicion to the server.

The server knows The Anonymizer is being used.

If there is enough other traffic, you are Probably Innocence to a global observer.

The global observer knows you are using the “The Anonymizer”

There is no anonymity to the “The Anonymizer”

Page 21: A Survey Anonymity and Anonymous File-Sharing

Example: The Anonymizer

• From the small print:

• … we disclose personal information only in the good faith belief that we are required to do so by law, or that doing so is reasonably necessary …

• … Note to European Customers: The information you provide us will be transferred outside the European Economic Area

Page 22: A Survey Anonymity and Anonymous File-Sharing

Summary: The Theory of Anonymity

• There are many agents in a system each of which have different views.

• There are a number of different actions.

• We need to define the level of anonymity an user has when performing a certain action, given the attacker’s view of the system.

Page 23: A Survey Anonymity and Anonymous File-Sharing

Outline of Talk

• The theory of Anonymity.

• Designs for anonymity.

• Anonymous file-sharing software.

• Some early results from the analysis of file-sharing software.

Page 24: A Survey Anonymity and Anonymous File-Sharing

Theoretical Designs for Anonymity

• We have seen an example of anonymity from a Proxy.

• In Friend-to-Friend networks:– nodes have fixed neighbours,– only direct neighbours know IP addresses,– nodes act as proxies for there neighbours.

• Anonymity to your neighbour is by trust or by claiming you are just acting as a proxy.

Page 25: A Survey Anonymity and Anonymous File-Sharing

Ants

The Ants protocol is for ah-hoc networking.

Each node has a pseudo ID.

A node broadcasts a request, labeled with its own ID.

Nodes record IDs it receives over each connections.

A

Page 26: A Survey Anonymity and Anonymous File-Sharing

Ants

If another nodes wishes to reply to the request:

It sends packets labeled with its own ID

The packets are sent along the most used connection for the to ID.A

Page 27: A Survey Anonymity and Anonymous File-Sharing

MIXes

• MIXes are proxies that forward messages between them

• A user contacts a MIX to send a message

• The MIX waits until it has received a number of messages, then forwards them in different order

Page 28: A Survey Anonymity and Anonymous File-Sharing

MIXes

• It is difficult to trace the route of each message.

• Provides beyond suspicion S-R unlinkability even w.r.t. a global attacker.

• Messages have to be delayed (can be solved with dummy traffic).

• More complicated when sending series of packets

Page 29: A Survey Anonymity and Anonymous File-Sharing

Onion Routing

• Messages are routed through a number of nodes called Core Onion Routers (COR)

• The initiator selects the whole route and encrypts the message with all keys in reverse order

• Each node unwraps a layer (onion) and forwards the message to the next one

{{{m}k3

}k2

}k1

{{m}k3

}k2

1 2 3{m}

k3m

Page 30: A Survey Anonymity and Anonymous File-Sharing

Onion Routing

• Each node only learns the next one in the path• Can be used together with MIXing.• End-users can run their own COR

– Better anonymity• or use an existing one

– More efficient– User's identity is revealed to the COR

Page 31: A Survey Anonymity and Anonymous File-Sharing

Crowds

• A crowd is a group of n nodes• The initiator selects randomly a node (called

forwarder) and forwards the request to it• A forwarder:

– With prob. 1-pf selects

randomly a new node andforwards the request to him

– With prob. pf sends the

request to the server

server

Page 32: A Survey Anonymity and Anonymous File-Sharing

Crowds

• Beyond suspicion w.r.t. the server

• Some of the nodes could be corrupted.

• The initiator could forward the message to a corrupted node.

• Probable innocence w.r.t. a node(under conditions on the number of corrupted nodes).

Page 33: A Survey Anonymity and Anonymous File-Sharing

Dining Cryptographers

• Nodes form a ring• Each adjacent pair picks a random number• Each node broadcasts the sum (xor) of the

adjacent numbers• The user who wants to send a

message also adds the message• The total sum (xor) is:

r1+r

2+r

2+r

3+r

3+

r4+r

4+r

5+r

5+r

1+m = m

r1

r4

r5

r3

r2

r1+r

2

r5+r

1

r4+r

5

r3+r

4r

2+r

3 +m

Page 34: A Survey Anonymity and Anonymous File-Sharing

Dinning Cryptographers

• It's impossible to tell who added m.

• Beyond suspicion even w.r.t. to a global attacker.

• Very inefficient: everyone must send the same amount of data as the real sender.

• More info in Catuscia's talk

Page 35: A Survey Anonymity and Anonymous File-Sharing

Mutli-casting

• Broadcast the message to the whole network.

• Provides beyond suspicion for the receiver.

• No anonymity for the sender.

• Multicasting is an efficient technique for broadcasting messages.

• but very inefficient to send just one message.

Page 36: A Survey Anonymity and Anonymous File-Sharing

Spoofed UDP

• IP packets on the Internet contain the IP address of the sender

• This address is not used by routers, only by higher-level protocols such as TCP

• UDP does not use this address

• A random address can be used instead to provide sender anonymity

• Method prohibited by many ISPs

Page 37: A Survey Anonymity and Anonymous File-Sharing

Summary of methods

Page 38: A Survey Anonymity and Anonymous File-Sharing

Outline of Talk

• The theory of anonymity.

• Designs for anonymity.

• Anonymous file-sharing software.

• Some early results from the analysis of file-sharing software.

Page 39: A Survey Anonymity and Anonymous File-Sharing

Mute

• Mute is an open source project based on the Ants protocol.

• Mute uses a complicated 3 stage time-to-live counter that allows an attack.

• In Mute all the probabilistic choices are fixed when a node starts. This protects against statistical attacks.

Page 40: A Survey Anonymity and Anonymous File-Sharing

Ants

• Ants is also an open source project based on the Ants protocol.

• There is a probabilistic change of dropping a search request. Avoiding some attacks but giving little control over searches.

• Ants send most reply packets over the best route but sends some by other routes. This is done for efficiency by it also stops some attacks by inside nodes.

Page 41: A Survey Anonymity and Anonymous File-Sharing

Mantis

• Mantis is an academic project that uses the Ants protocol.

• But the sender may make its IP address public and receive the file by address spoofed UDP.

• Hence only the responder is anonymous, but the system is very efficient.

Page 42: A Survey Anonymity and Anonymous File-Sharing

Anonymous Peer-to-Peer File-Sharing (APFS)

• APFS is based on Onion Routing• Volunteer nodes act as proxies. • Centralised servers store an “onion

routes” for files.• Searching is carried out by asking a

server for an onion route for a file.• Pro: Secure system, Con: Hard to set

up and maintain.

Page 43: A Survey Anonymity and Anonymous File-Sharing

Freenet and Free Haven

• There are a number of “anonymous publishing system”.

• For example Freenet and the MIX based Free Haven.

• These systems make the original author of a file anonymous, not the responder.

• Nodes will often cache files.Therefore you can “trick” a node into storing and “offering” a file.

Page 44: A Survey Anonymity and Anonymous File-Sharing

Waste

• Waste is a friend-to-friend network. It is designed for small groups (under 50 nodes).

• The sender and receive are known to network insiders, but anonymous to an outside attacker.

• Dummy traffic traffic is sent between nodes whenever they are idle.

Page 45: A Survey Anonymity and Anonymous File-Sharing

Tor

• Tor is an anonymous transport layer.

• It does not implement a file-sharing but file-sharing software can be run on top of it.

• Tor implements onion routing without MIXes.

• Its possible that a program run on top of Tor will reveal its IP address.

Page 46: A Survey Anonymity and Anonymous File-Sharing

Some Other Systems

AP3 Crowds Mislove et al.Entropy Freenet entrop.stop1984.comGNUnet MIXes gnunet.org I2P Onion routing www.i2p.net Nodezilla Freenet www.nodezilla.net

Napshare Ants napshare.sourceforge.netSSMP Secret sharing Dingledine et al.

& onion routing

There are others!

Page 47: A Survey Anonymity and Anonymous File-Sharing

Outline of Talk

• The theory of anonymity.

• Designs for anonymity.

• Anonymous file-sharing software.

• Some early results for the analysis of file-sharing software.

Page 48: A Survey Anonymity and Anonymous File-Sharing

Goals for Anonymous File-Sharing using Ants

• The attacker is a node in the network and must discover the pseudo ID of its nieghbours.

• Sender (requesting files) is Probable Innocence to nodes and responder.

• Responder (offering files for download) is Probable Innocence to nodes and sender.

Page 49: A Survey Anonymity and Anonymous File-Sharing

The Model

• The model of the network is a connected weighted graph.

• The weights are the times it takes for a message to travel along that connection.

• Travel times are fixed.

• A single attacker, no timed-based attacks.

• No time-to-live counter.

Page 50: A Survey Anonymity and Anonymous File-Sharing

The Attackers View

• Its connections and the real addresses of the nodes each of these connections leads too.

• The pseudo IDs from the messages it has seen.

• For each pseudo ID, the ordered over which the attacker receives message

• The ``to'' and ``from'' pseudo address of all the messages past across it.

Page 51: A Survey Anonymity and Anonymous File-Sharing

The Attackers View

• The attacker may also send messages.

• It can form message out of its own random values, its own address or any address is has seen.

• In particular, it can send messages the “wrong way”.

Page 52: A Survey Anonymity and Anonymous File-Sharing

Time-Based Attacks

• The quickest reply along any connection will come from the direct neighbour.

• The attacker may try random request, and note the reply times.

• The pseudo ID with the fastest reply time over any connection is assume to be the neighbour.

• If a node shares any files at all, it is not anonymous to its neighbour.

Page 53: A Survey Anonymity and Anonymous File-Sharing

Result

• Assuming no timed-based attacks, there is still a problem:

• The attacker might just see one pseudo ID over a connection.

• Or have a unique pseudo ID “bounced back”.

• i.e., anonymity depends on how the nodes are connected.

Page 54: A Survey Anonymity and Anonymous File-Sharing

Result

• One node on its own is not anonymous.

• Only node one node fastest along a connection is not anonymous.

N

A

Page 55: A Survey Anonymity and Anonymous File-Sharing

Result

• Active attacks allow more discrimination.

• A receives two IDs first over each connection.

• But N3 and N4 are bounced back

• Therefore the attack can identify N1 and N2.

N1

A

N3

N2

N4

Page 56: A Survey Anonymity and Anonymous File-Sharing

Result

• If we assume that the attackers neighbours might never share files then Ants is anonymous.

• Otherwise:– The Ants protocol can be broken by a timed

attack.– If any connection is not used by at least two

different pairs of nodes to communicate then the nodes on this connection are not anonymous to each other.

Page 57: A Survey Anonymity and Anonymous File-Sharing

Protected Addresses

• Attacker can make a message with another node’s pseudo ID as the from address.

• This lets it disrupt communication.

• We can generate a key pair and use the authentication key as the pseudo ID.

• The sender signs the message ID.

• Hence the attacker cannot fake messages.

Page 58: A Survey Anonymity and Anonymous File-Sharing

Other Kinds of Attack

• Global Attacker• System Membership• Time-to-Live Attacks (Mute, Mantis)• Multiple Attackers (Mute)• Statistical Attacks (MIXes)• Forced Repeat (Crowds)• Nodes Joining and Leaving• Denial of Service (Mute)

Page 59: A Survey Anonymity and Anonymous File-Sharing

Outline of Talk

• The theory of Anonymity.

• Designs for Anonymity

• Anonymous file-sharing software

• Some early results for the analysis of file-sharing software.

Page 60: A Survey Anonymity and Anonymous File-Sharing

Further Work

• Ants Protocol:– Finish formal model and testing,– Time delays,– Deciding when a network is safe,– MIXes for file-sharing.

• General purpose formal methods for anonymous systems.

Page 61: A Survey Anonymity and Anonymous File-Sharing

Questions?

Page 62: A Survey Anonymity and Anonymous File-Sharing

Example: Anonymous File-Sharing

• The user may wish to hide – that they are offering files– that they are taking part in

data transfer– that they are running the

software at all.

• The user may want to have plausible deniability or go complete unnoticed.

Page 63: A Survey Anonymity and Anonymous File-Sharing

Example: Anonymous File-Sharing

• The user may wish to hide – that they are offering files– that they are taking part in

data transfer– that they are running the

software at all.

• The user may want to have plausible deniability or go complete unnoticed.

Page 64: A Survey Anonymity and Anonymous File-Sharing

Forced Repeat Attack: Crowds

Page 65: A Survey Anonymity and Anonymous File-Sharing

Time-to-live Attack: Mute

Page 66: A Survey Anonymity and Anonymous File-Sharing

Time-to-live Attack: Mantis