60
DNSSEC / Privacy CS 161: Computer Security Prof. Vern Paxson TAs: Devdatta Akhawe, Mobin Javed & Matthias Vallentin http://inst.eecs.berkeley.edu/~cs161/ April 5, 2011

CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

DNSSEC / Privacy

CS 161: Computer SecurityProf. Vern Paxson

TAs: Devdatta Akhawe, Mobin Javed& Matthias Vallentin

http://inst.eecs.berkeley.edu/~cs161/April 5, 2011

Page 2: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Today’s Lecture

• Finish discussion of DNSSEC– Ensuring that DNS results indeed match

those from the corresponding authority

• A look at privacy– Mechanisms & practices that subvert it– Technical measures to obtain it

Page 3: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Securing DNS Lookups

• How can we ensure that when clients look upnames with DNS, they can trust the answers theyreceive?

• Idea #1: do DNS lookups over TLS– (assuming either we run DNS over TCP, or we use

“Datagram TLS”)– Issues?

• Performance: DNS is very lightweight. TLS is not.• Caching: crucial for DNS scaling. But then how do we keep

authentication assurances?

• Idea #2: make DNS results like certs– I.e., a verifiable signature that guarantees who

generated a piece of data; signing happens off-line

Page 4: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Operation of DNSSEC• DNSSEC = standardized DNS security

extensions currently being deployed1. Suppose we look up mail.google.com

– We get an answer from google.com nameserver (NS)– Plus: signature for answer (in Additional section)

purportedly signed by google.com NS2. Look up public key for google.com NS

– That answer is signed by .com NS3. Look up public key for .com NS

– That answer is signed by root (‘.’) NS4. Root NS’s public key is wired into our resolver• All of these keys are cacheable

(simplified)

Page 5: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

Ordinary DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

Page 6: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

This key …

Page 7: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

… validates thissignature

Page 8: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

Similarly, the root willreturn .com’s KEY, whichwill validate this signature

Page 9: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

Finally, we can validatethe .com KEY supposedlyreturned by the root usingour hardwired knowledgeof the root’s public key

Page 10: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

mail.google.com A 1.2.3.4

mail.google.com?Client ns1.google.com

DNS:

mail.google.com A 1.2.3.4SIG 0x1F92..9

mail.google.com?Client ns1.google.com

DNSSEC:

google.com KEY 0x828C..ESIG 0x90A4..5

google.com?Client com’s NS

Upon completing all of these signaturevalidations, we have strong confidence inthe chain of signatures, and thus in thecorrectness of the mail.google.com result

Page 11: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Issues With DNSSEC ?

• Issue #1: Replies are Big– E.g., “dig  +dnssec  berkeley.edu” can return 2100+ B– DoS amplification– Increased latency on low-capacity links– Headaches w/ older libraries that assume replies < 512B

• Issue #2: Partial deployment– Suppose .com not signing, though google.com is– Major practical concern. What do we do?– Can wire additional key into resolver (doesn’t scale)– Or: outsource to trusted third party (“lookaside”)

• Wire their key into resolver, they sign numerous early adopters

Page 12: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Issues With DNSSEC, con’t• Issue #3: Partial deployment

– What do you do with unsigned/unvalidated results?– If you trust them, weakens incentive to upgrade– If you don’t trust them, a whole lot of things break

• Issue #4: Negative results (“no such name”)– What statement does the nameserver sign?– If “gabluph.google.com” doesn’t exist, then have to do

dynamic key-signing (expensive) for any bogus request• DoS vulnerability

– Instead, sign (off-line) statements about order of names• E.g., sign “gabby.google.com followed by gabrunk.google.com”• Thus, can see that gabluph.google.com can’t exist

– But: now attacker can enumerate all names that exist :-(

Page 13: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Issues With DNSSEC, con’t

• Issue #5: Who do you really trust?– For your laptop, say, who does all the “grunt work” of

fetching keys & validating DNSSEC signatures?

• Convenient answer: your laptop’s local resolver– … which you acquire via DHCP in your local coffeeshop– I.e., exactly the most-feared potentially untrustworthy

part of the DNS resolution process!

• Alternatives?⇒ Your laptop needs to do all the validation work itself

Page 14: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Privacy

Page 15: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Defining Privacy

• Privacy = right to control who knows certainaspects about you / your communications /your activities– Control over disclosure– And ideally over subsequent use

• How much of an issue is this?E.g., how much information about you doweb sites learn as you surf?

Page 16: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Privacy & Web Surfing• The sites you visit learn:

– The URLs you’re interested in• Google/Bing also learns what you’re searching for

– Your IP address• Thus, your service provider & geo-location• Can often link you to other activity including at other

sites– Your browser’s capabilities, which OS you run,

which language you prefer– Which URL you looked at that took you there

• Via “Referer” header

Page 17: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Privacy & Web Surfing, con’t

• Oh and also cookies.• Cookies = state that server tells browser to

store locally– Name/value pair, plus expiration date

• Browser returns the state any time visitingthe same site

• Where’s the harm in that?And are these used much anyway?

Page 18: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Let’s remove allof our cookies

Page 19: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

We do a Google searchon “private browsing”

And we click onthe top result

Page 20: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Note that this mode isprivacy from your family,not from web sites!

Page 21: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

What on earth is Googletracking in this one?

It sticks aroundfor 6 months

Whoa - we gained11 cookies!

Page 22: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Hmmm. Mozillais tracking us too.And for 5 years!

Page 23: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

They’re even rememberingjust how we visited them

Page 24: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

And something else(as we’ll see in a bit)until the End Of Time

Page 25: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

(MY IP Address)

Without doing anythingelse, we’ve gained a12th cookie …

Page 26: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

We now do just one moreoperation, opening the homepage of www.nytimes.com

Page 27: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

doubleclick.net -who’s that?And how did it getthere from visitingwww.nytimes.com?

What a lot ofyummy cookies!

Page 28: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Third-Party Cookies• How can a web site enable a third party to plant

cookies in your browser & later retrieve them?– Answer: using a “web bug”– Include on the site’s page (for example):

• <img  src="http://doubleclick.net/ad.gif"  width=1height=1>

• Why would a site do that?– Site has a business relationship w/ DoubleClick– Now DoubleClick sees all of your activity that involves

their web sites (each of them includes the web bug)• Because your browser dutifully sends them their cookies for

any web page that has that web bug• Identifier in cookie ties together activity as = YOU

*

* Owned by Google, by the way

Page 29: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Remember thistill-the-End-of-Timecookie?

Page 30: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Google Analytics• Any web site can (anonymously) register with

Google to instrument their site for analytics– Gather information about who visits, what they do

when they visit• To do so, site adds a small Javascript snippet

that loads http://www.google-analytics.com/ga.js– You can see sites that do this because they introduce

a "__utma" cookie• Code ships off to Google information associated

with your visit to the web site– Shipped by fetching a GIF w/ values encoded in URL– Web site can use it to analyze their ad “campaigns”– Not a small amount of info …

Page 31: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 32: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Values Reported viaGoogle Analytics

Page 33: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Still More Tracking Techniques …

• Any scenario where browsers executeprograms that manage persistent statecan support tracking by cookies– Such as …. Flash ?

Page 34: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

My browser hadFlash cookiesfrom 67 sites!

Sure, this is where you’dthink to look to analyzewhat Flash cookies arestored on your machine

Some Flash cookies “respawn”regular browser cookies thatyou previously deleted!

Page 35: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Still More Tracking Techniques …

• Any scenario where browsers executeprograms that manage persistent statecan support tracking by cookies– Such as …. Flash ?

• Surely though something asinnocuous as cut-and-paste is safethough, right? (demo)

Page 36: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 37: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Privacy - What’s the Big Deal?• Cookies etc. form the core of how Internet

advertising works today– Without them, arguably you’d have to pay for content

up front a lot more• (and payment would mean you’d lose anonymity anyway)

– A “better ad experience” is not necessarily bad• Ads that reflect your interests; not seeing repeated ads

• But: ease of gathering so much data so easily ⇒concern of losing control how it’s used– Mission creep …

• Consider how ordering a pizza in the near future might work(http://www.aclu.org/ordering-pizza)

– Content shared with friends doesn’t just stay withfriends …

Page 38: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

When you interview, theyKnow What You’ve Posted

Page 39: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 40: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Privacy - What’s the Big Deal?• Cookies etc. form the core of how Internet advertising

works today– Without them, arguably you’d have to pay for content up front a lot

more• (and payment would mean you’d lose anonymity anyway)

– A “better ad experience” is not necessarily bad• Ads that reflect your interests; not seeing repeated ads

• But: ease of gathering so much data so easily ⇒ concernof losing control how it’s used– Mission creep …

• Consider how ordering a pizza in the near future might work(http://www.aclu.org/ordering-pizza)

– Content shared with friends doesn’t just stay with friends …– You really don’t have a good sense of just what you’re giving

away …

Page 41: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 42: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 43: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 44: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 45: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 46: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

How To Gain Better Privacy?• Force of law

– Example #1: web site privacy policies• US sites that violate them commit false advertising• But: policy might be “Yep, we sell everything about

you, Ha Ha!”

Page 47: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

The New Yorker’s PrivacyPolicy (when you buy their archives)

7. Collection of Viewing Information. Youacknowledge that you are aware of and consentto the collection of your viewing informationduring your use of the Software and/or Content.Viewing information may include, withoutlimitation, the time spent viewing specific pages,the order in which pages are viewed, the time ofday pages are accessed, IP address and user ID.This viewing information may be linked topersonally identifiable information, such as nameor address and shared with third parties.

Page 48: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

How To Gain Better Privacy?• Force of law

– Example #1: web site privacy policies• US sites that violate them commit false advertising• But: policy might be “Yep, we sell everything about

you, Ha Ha!”– Example #2: SB 1386

• Requires an agency, person or business that conductsbusiness in California and owns or licensescomputerized 'personal information' to disclose anybreach of security (to any resident whose unencrypteddata is believed to have been disclosed)

• Quite effective at getting sites to pay attention tosecuring personal information

Page 49: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 50: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Gaining Privacy ThroughTechnical Means

• How can we surf the web truly anonymously?• Step #1: remove browser leaks

– Delete cookies (oops - also Flash cookies!)– Turn off Javascript (so Google Analytics doesn’t track you)

• Step #2: how do we hide our IP address?• One approach: trusted third party

– E.g.

Page 51: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose
Page 52: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Gaining Privacy ThroughTechnical Means

• How can we surf the web truly anonymously?• Step #1: remove browser leaks

– Delete cookies (oops - also “Flash cookies”!)– Turn off Javascript (so Google Analytics doesn’t track you)

• Step #2: how do we hide our IP address?• One approach: trusted third party

– E.g. hidemyass.com• You set up an encrypted VPN to their site• All of your traffic goes via them

Page 53: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Alice HMA Bob{M,Bob}KHMA M

Alice wants to send a message M to Bob …

… but ensuring that Eve can’t determine that she’sindeed communicating with Bob.

HMA accepts messages encrypted for it.Extracts destination and forwards.

Page 54: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Gaining Privacy ThroughTechnical Means

• How can we surf the web truly anonymously?• Step #1: remove browser leaks

– Delete cookies (oops - also “Flash cookies”!)– Turn off Javascript (so Google Analytics doesn’t track you)

• Step #2: how do we hide our IP address?• One approach: trusted third party

– E.g. hidemyass.com• You set up an encrypted VPN to their site• All of your traffic goes via them

– Issues?• Performance• ($80-$200/year)• “rubber hose cryptanalysis” (cf. anon.penet.fi & Scientologists)

Page 55: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Alice HMA{{M, Bob}KCharlie,Charlie}KHMA

Alice wants to send a message M to Bob …

… but ensuring that Eve can’t determine that she’sindeed communicating with Bob …

… and that HMA can’t determine it, either.

M

Bob

Charlie{M, Bob}KCharlie

Charlie can tell that someoneis communicating with Bob viaHMA, but not that it’s Alice

HMA can tell that Alice iscommunicating with Charlie,but not that it’s ultimately Bob

Page 56: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Onion Routing

• This approach generalizes to an arbitrarynumber of intermediaries (“mixes”)

• As long as any of the mixes is honest, no onecan link Alice with Bob

• Note: this is what the industrial-strength Toranonymizing service uses– It also provides bidirectional communication

Page 57: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Onion Routing Issues/Attacks?• Performance: message bounces around a lot• Key management: the usual headaches• Attack: rubber-hose cryptanalysis of mix operators

– Defense: use mix servers in different countries• Though this makes performance worse :-(

• Attack: adversary operates all of the mixes– Defense: have lots of mix servers (Tor today: ~2,000)

• Attack: adversary observes when Alice sends andwhen Bob receives, links the two together– A “confirmation” attack– Defenses: pad messages, introduce significant delays

• Tor does the former, but notes that it’s not enough for defense

Page 58: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Onion Routing Attacks, con’t• Issue: leakage• Suppose all of your HTTP/HTTPS traffic goes

through Tor, but the rest of your traffic doesn’t– Because you don’t want it to suffer performance hit

• How might the operator of sensitive.comdeanonymize your web session to their server?

• Answer: they inspect the logs of their DNS server tosee who looked up sensitive.com just before yourconnection to their web server arrived

• Hard, general problem: anonymity often at riskwhen adversary can correlate separate sources ofinformation

Page 59: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Dataset Privacy• Difficult issues of anonymity arise when

releasing database records• Recent example: Netflix released a portion of

their customer records in a contest toimprove their recommendation system– Data included anonymized user ID, some of the

movies user rated, how much the user likedthem, and when user rated them

• How could (some) users be deanonymized?

Page 60: CS 161: Computer Securityinst.eecs.berkeley.edu/~cs161/sp11/slides/4.5... · Operation of DNSSEC •DNSSEC = standardized DNS security extensions currently being deployed 1.Suppose

Dataset Privacy• Attackers (researchers) cross-correlated with

non-anonymous IMDB movie reviews– Looked for rarely-reviewed movies for which

same movie was reviewed in Netflix & IMDB atabout the same time

• General finding: in datasets with modestlevel of details, individuals tend to be in someway unique

• Related finding: birthdate + gender + zipcode = unique for 60+% of US population!