bti 4202: anonymity - grothoff

40
BTI 4202: Anonymity Christian Grothoff Berner Fachhochschule 21.5.2021

Upload: others

Post on 05-Jun-2022

20 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BTI 4202: Anonymity - Grothoff

BTI 4202: Anonymity

Christian Grothoff

Berner Fachhochschule

21.5.2021

Page 2: BTI 4202: Anonymity - Grothoff

Learning Objectives

Opportunistic Encryption

Basic Design for Anonymizing Systems

Tor

References

Page 3: BTI 4202: Anonymity - Grothoff

Part IV: Introduction to p≡p

Page 4: BTI 4202: Anonymity - Grothoff

Guest Speaker: Hernani Marques

I Executive Director of the p≡p foundation

I Speaker of CCC SwitzerlandI Practices his own brand of applied ethics (aka

non-parliamentary law-making):I Bundes-Ref. Biometrische PasseI Kant. VI Bildungsinitiative Zurich (Abschaffung Schulgelder)I Bundes-Ref. Uberwachungsgesetz BUPFI Bundes-Ref. Geheimdienstgesetz NDGI Bundes-Ref. GeldspielgesetzI Bundes-VI E-Voting-Moratorium (vorzeitig abgebrochen)I Bundes-Ref. VersicherungsspioneI Bundes-Ref. E-ID (erfolgreich)I Bundes-Ref. Polizeimassnahmengesetz PMT (13.6.2021)

Page 5: BTI 4202: Anonymity - Grothoff

Please join Big Blue Button

https://meet.pep.security/b/chr-8ym-6a5-zim

Page 6: BTI 4202: Anonymity - Grothoff

Part II: Anonymizing Systems

Page 7: BTI 4202: Anonymity - Grothoff

Anonymity: Dining Cryptographers

“Three cryptographers are sitting down to dinner. The waiter in-forms them that the bill will be paid anonymously. One of the cryp-tographers maybe paying for dinner, or it might be the NSA. Thethree cryptographers respect each other’s right to make an anony-mous payment, but they wonder if the NSA is paying.” – DavidChaum

Page 8: BTI 4202: Anonymity - Grothoff

MixingDavid Chaum’s mix (1981) and cascades of mixes are the traditionalbasis for destroying linkability:

Page 9: BTI 4202: Anonymity - Grothoff

MixingDavid Chaum’s mix (1981) and cascades of mixes are the traditionalbasis for destroying linkability:

Page 10: BTI 4202: Anonymity - Grothoff

Threshold Mix

Page 11: BTI 4202: Anonymity - Grothoff

Timed Mix

Page 12: BTI 4202: Anonymity - Grothoff

Pool mix

Page 13: BTI 4202: Anonymity - Grothoff

Mixminion

G. Danezis, R. Dingledine, D. Hopwood and N. Mathewson describeMixminion [1]:

I based on mixmailers (only application is E-mail)

I possibility to reply

I directory servers to evaluate participating remailers(reputation system)

I exit policies

Page 14: BTI 4202: Anonymity - Grothoff

Mixminion: key ideas

When a message traverses mixminion, each node must decrypt themessage using its (ephemeral) private key.

The key idea behind the replies is splitting the path into two legs:

I the first half is chosen by the responder to hide the responderidentity

I the second half was communicated by the receiver to hide thereceiver identity

I a crossover-node in the middle is used to switch the headersspecifying the path

Page 15: BTI 4202: Anonymity - Grothoff

Mixminion: replay?

Replay attacks were an issue in previous mixnet implementations.

I Mixes are vulnerable to replay attacks

I Mixminion: servers keep hash of previously processedmessages until the server key is rotated

⇒ Bounded amount of state in the server, no possibility forreplay attack due to key rotation

Page 16: BTI 4202: Anonymity - Grothoff

Mixminion: Directory Servers

I Inform users about servers

I Probe servers for reliability

I Allow a partitioning attack unless the user always queries alldirectory servers for everything

Page 17: BTI 4202: Anonymity - Grothoff

Mixminion: Nymservers

I Nymservers keep list of use-once reply blocks for a user

I Vulnerable to DoS attacks (deplete reply blocks)

I Nymservers could also store mail (use one reply block formany messages).

Page 18: BTI 4202: Anonymity - Grothoff

Mixminion: obvious problems

I no benefits for running a mixmailer for the operator

I quite a bit of public key cryptography

I trustworthiness of directory servers questionable

I servers must keep significant (but bounded) amount of state

I limited to E-mail (high latency)

Page 19: BTI 4202: Anonymity - Grothoff

Mixminion: open problems

I exit nodes are fair game for legal actions

I no accounting to defend against abuse / DoS attacks

I statistical correlation of entities communicating over timepossible (observe participation)

⇒ bridging between an anonymous network and a traditionalprotocol is difficult

Page 20: BTI 4202: Anonymity - Grothoff

Break

Page 21: BTI 4202: Anonymity - Grothoff

Part III: Tor

Page 22: BTI 4202: Anonymity - Grothoff

Tor

I Tor is a P2P network of low-latency mixes which are used toprovide anonymous communication between parties on theInternet.

I Tor works for any TCP-based protocol

I TCP traffic enters the Tor network via a SOCKS proxy

I Common usage: client anonymity for web browsing

Page 23: BTI 4202: Anonymity - Grothoff

Onion Routing

I Multiple mix servers

I Path of mix servers chosen by initiatorI Chosen mix servers create “circuit”

I Initiator contacts first server S1, sets up symmetric key KS1

I Then asks first server to connect to second server S2; throughthis connection sets up symmetric key with second server KS2

I ...I Repeat with server Si until circuit of desired length n

constructed

Page 24: BTI 4202: Anonymity - Grothoff

Onion Routing Example

I Client sets up symmetric key KS1 with server S1

S1

S2

Client

Exchange

KS1

Page 25: BTI 4202: Anonymity - Grothoff

Onion Routing Example

I Via S1 Client sets up symmetric key KS2 with server S2

S1

S2

Client

Exchange

KS2

Page 26: BTI 4202: Anonymity - Grothoff

Onion Routing Example

I Client encrypts m as KS1(KS2(m)) and sends to S1

S1

S2

Client

(KS2

KS1

(m))

Page 27: BTI 4202: Anonymity - Grothoff

Onion Routing Example

I S1 decrypts, sends on to S2, S2 decrypts, revealing m

S1

S2

Client

(KS2

KS1

(m))KS

2(m)

Page 28: BTI 4202: Anonymity - Grothoff

Tor - How it Works

I Low latency P2P Network of mix servers

I Designed for interactive traffic (https, ssh, etc.)I ”Directory Servers“ store list of participating servers

I Contact information, public keys, statisticsI Directory servers are replicated for security

I Clients choose servers randomly with bias towards highBW/uptime

I Clients build long lived Onion routes ”circuits“ using theseservers

I Circuits are bi-directional

I Circuits are of length three

Page 29: BTI 4202: Anonymity - Grothoff

Tor - How it Works - Example

I Example of Tor client circuit

Client

Server

Tor Node 1 Tor Node 2 Tor Node 3

Tor Node 4 Tor Node 5 Tor Node 6

Tor Node 7 Tor Node 8 Tor Node 9

Page 30: BTI 4202: Anonymity - Grothoff

Tor - How it Works - Servers

I Servers are classified into three categories for usability,security and operator preference

I Entry nodes (aka guards) - chosen for first hop in circuitI Generally long lived ”good“ nodesI Small set chosen by client which are used for client lifetime

(security)

I Middle nodes - chosen for second hop in circuit, leastrestricted set

I Exit nodes - last hop in circuitI Visible to outside destinationI Support filtering of outgoing trafficI Most vulerable position of nodes

Page 31: BTI 4202: Anonymity - Grothoff

Hidden Services in Tor

I Hidden services allow Tor servers to receive incomingconnections anonymously

I Can provide access to services available only via TorI Web, IRC, etc.I For example, host a website without your ISP knowing

Page 32: BTI 4202: Anonymity - Grothoff

Hidden Services Example 1

Page 33: BTI 4202: Anonymity - Grothoff

Hidden Services Example 2

Page 34: BTI 4202: Anonymity - Grothoff

Hidden Services Example 3

Page 35: BTI 4202: Anonymity - Grothoff

Hidden Services Example 4

Page 36: BTI 4202: Anonymity - Grothoff

Hidden Services Example 5

Page 37: BTI 4202: Anonymity - Grothoff

Hidden Services Example 6

Page 38: BTI 4202: Anonymity - Grothoff

Types of Attacks on Tor

I Exit Relay Snooping

I Website fingerprinting

I Traffic Analysis

I Intersection Attack

I DoS

Page 39: BTI 4202: Anonymity - Grothoff

Exercise

I Install Tor

I Configure Tor relay

I Setup hidden service

I Perform risk analysis for deanonymization

Page 40: BTI 4202: Anonymity - Grothoff

References

George Danezis, Roger Dingledine, and Nick Mathewson.Mixminion: Design of a type iii anonymous remailer protocol.In Proceedings of the 2003 IEEE Symposium on Security andPrivacy, SP ’03, 2003.

Brad Miller, Ling Huang, A.D. Joseph, and J.D. Tygar.I know why you went to the clinic: Risks and realization ofhttps traffic analysis.http://arxiv.org/abs/1403.0297, 2014.