network security: anonymity

32
Network Security: Anonymity Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012

Upload: fiona-dudley

Post on 03-Jan-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Network Security: Anonymity. Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2012. Outline. Anonymity and privacy High-latency anonymous routing Low-latency anonymous routing — Tor. Anonymity and privacy. Anonymity terminology. Identity, identifier - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Security:  Anonymity

Network Security: Anonymity

Tuomas AuraT-110.5241 Network security

Aalto University, Nov-Dec 2012

Page 2: Network Security:  Anonymity

2

Outline

1. Anonymity and privacy2. High-latency anonymous routing3. Low-latency anonymous routing — Tor

Page 3: Network Security:  Anonymity

Anonymity and privacy

3

Page 4: Network Security:  Anonymity

4

Anonymity terminologyIdentity, identifierAnonymity — they don’t know who you areUnlinkability — they cannot link two events or actions (e.g. messages) with each otherPseudonymity — intentionally allow linking of some events to each other

E.g. sessions, payment and service access

Authentication — strong verification of identityWeak identifier — not usable for strong authentication but may compromise privacy

E.g. nickname, IP address, SSID, service usage profile

Authorization — verification of access rightsDoes not always imply authentication (remember SPKI)

Page 5: Network Security:  Anonymity

5

Anonymity in communicationsAnonymity towards communication peers

Sender anonymity — receiver does not know who and where sent the messageReceiver anonymity — can send a message to a recipient without knowing who and where they are

Third-party anonymity — an outside observer cannot know who is talking to whom

Unobservability — an outside observer cannot tell whether communication takes place or notStrength depends on the capabilities of the adversary

Anonymity towards access networkAccess network does not know who is roaming there

Relate concept: location privacy

Page 6: Network Security:  Anonymity

6

PrivacyControl over personal information

Emphasized in EuropeGathering, disclosure and false representation of facts about one’s personal life

Right to be left aloneEmphasized in AmericaAvoiding interference, control, discrimination, spam, censorship

Anonymity is a tool for achieving privacyBlending into the crowd

Page 7: Network Security:  Anonymity

7

Who is the adversary?Discussion: who could violate your privacy and anonymity?Global attacker, your government

e.g. total information awareness, retention of traffic data

Servers across the Internet, colluding commercial interests

e.g. web cookies, trackers, advertisers

Criminalse.g. identity theft

EmployerPeople close to you

e.g. stalkers, co-workers, neighbors, family members

Page 8: Network Security:  Anonymity

8

Randomized identifiersReplace permanent identifiers with random pseudonyms, e.g. TMSI in GSMEspecially important below the encryption layer

Random interface id in IPv6 address [RFC 4941] Random MAC addresses suggested

Need to consider weak identifiers (i.e. implicit identifiers), too

E.g., IPID, TCP sequence number

Page 9: Network Security:  Anonymity

9

Strong anonymity?Anonymity and privacy of communications mechanisms are not strong in the same sense as strong encryption or authenticationEven the strongest mechanisms have serious weaknesses

Need to trust many others to be honestServices operated by volunteers and activistsSide-channel attacks

Anonymity tends to degrade over time for persistent communication

Page 10: Network Security:  Anonymity

High-latency anonymous routing

Page 11: Network Security:  Anonymity

11

Mix (1)

MixEMix(F,M1)

EMix(H,M2)

EMix(G,M3)

EMix(E,M4)

M1

M2

M3

M4

D

C

B

A E

F

G

H

Mix is an anonymity service [Chaum 1981]Attacker sees both sent and received messages but cannot link them to each other → sender anonymity, third-party anonymity against a global observerThe mix receives encrypted messages (e.g. email), decrypts them, and forwards to recipients

Page 12: Network Security:  Anonymity

12

Mix (2)

Attacker can see the input and output of the mixAttacker cannot see how messages are shuffled in the mixAnonymity set = all nodes that could have sent (or could be recipients of) a particular message

MixEMix(F,M1)

EMix(H,M2)

EMix(G,M3)

EMix(E,M4)

M1

M2

M3

M4

D

C

B

A E

F

G

H

Page 13: Network Security:  Anonymity

13

Mix (3)MixEMix(F,M1)

EMix(H,M2)

EMix(G,M3)

EMix(E,M4)

M1

M2

M3

M4

D

C

B

A E

F

G

H

Two security requirements:Bitwise unlinkability of input and output messages — cryptographic property; must resist active attacksResistance to traffic analysis — add delay or inject dummy messages

Not just basic encryption! Must resist adaptive chosen-ciphertext attack (NM-CCA2)Replay prevention and integrity check needed at the mix

Examples of design mistakes:FIFO order of delivering messages; no freshness check at mix; no random initialization vector for encryption; no padding to hide message length; malleable encryption

Page 14: Network Security:  Anonymity

14

Mixing in practiceThreshold mix — wait to receive k messages before delivering

Anonymity set size k

Pool mix — mix always buffers k messages, sends one when it receives oneBoth strategies add delay → high latencyNot all senders and receivers are always active

In a closed system, injecting cover traffic can fix this (What about the Internet?)

Real communication (email, TCP packets) does not comprise single, independent messages but common traffic patterns such as connections

Attacker can observe beginning and end of connectionsAttacker can observe request and response pairs

→ statistical traffic analysis

Page 15: Network Security:  Anonymity

15

Who sends to whom?

DCBA E

FGH

DCBA E

FGH

DCBA E

FGH

DCBA E

FGH

DCBA E

FGH

DCBA E

FGH

DCBA E

FGH

Round 1 Round 2 Round 3

Round 4 Round 5 Round 6

Round 7

DCBA E

FGH D

CBA E

FGH

Round 8 Round 9

Threshold mix with threshold 3

Page 16: Network Security:  Anonymity

16

Anonymity metricsSize of the anonymity set: k-anonymity

Suitable for one round of threshold mixing

Problems with k-anonymity:Multiple rounds → statistical analysis based on understanding common patterns of communications can reveal who talks to whom, even if k for each individual message is highPool mix → k = ∞

Entropy: E = Σi=1…n (pi ∙ log2pi)

Measures the amount of missing in information in bits: how much does the attacker not knowCan measure entropy of the sender, recipient identity etc.

Problems with measuring anonymity:Anonymity of individual messages vs. anonymity in a systemDepends on the attacker’s capabilities and background informationAnonymity usually degrades over time as attacker collects more statistics

Page 17: Network Security:  Anonymity

17

Trusting the mixThe mix must be honest Example: anonymous remailers for email

anon.penet.fi 1993–96

→ Route packets through multiple mixes to avoid single point of failure Attacker must compromise all mixes on the route

Compromising almost all mixes may reduce the size of the anonymity set

Page 18: Network Security:  Anonymity

18

Mix network (1)

Page 19: Network Security:  Anonymity

19

Mix network (2)

Mix network is just a distributed implementation of mix

Page 20: Network Security:  Anonymity

20

Mix networksMix cascade — all messages from all senders are routed through the same sequence of mixes

Good anonymity, poor scalability, poor reliability

Free routing — each message is routed independently via multiple mixesOther policies between these two extremes

But remember that the choice of mixes could be a weak identifier

Onion encryption: Alice → M1: EM1(M2,EM2(M3,EM3(Bob,M)))

M1 → M2: EM2(M3,EM3(Bob,M))

M2 → M3: EM3(Bob,M)

M3 → Bob: MEncryption at every layer must provide bitwise unlinkability → detect replays and check integrity→ in free routing, must keep message length constant

Re-encryption mix — special crypto that keeps the message length constant with multiple layers of encryption

Page 21: Network Security:  Anonymity

21

Sybil attackAttack against open systems which anyone can join

Mixes tend to be run by volunteers

Attacker creates a large number of seemingly independent nodes, e.g. 50% off all nodes → some routes will go through only attacker’s nodesDefence: increase the cost of joining the network:

Human verification that each mix is operated by a different person or organizationThe IP address of each mix must be in a new domainRequire good reputation of a measurable kind that takes time and effort to establishSelect mixes in a route to be at diverse locations

Sybil attacks are a danger to most P2P systems, not just anonymous routing

E.g. reputation systems, content distribution

Page 22: Network Security:  Anonymity

22

Other attacks(n-1) attack

Attacker blocks all but one honest sender, floods all mixes with its own messages, and finally allows one honest sender to get though → easy to trace because all other packets are the attacker’sPotential solutions: access control and rate limiting for senders, dummy traffic injection, attack detection

Statistical attacksAttacker may accumulate statistics about the communication over time and reconstruct the sender-receiver pairs based on its knowledge of common traffic patterns

Page 23: Network Security:  Anonymity

23

Receiver anonymityAlice distributes a reply onion: EM3(M2,k3,EM2(M1,k2,EM1(Alice,k1,EAlice(K))))

Messages from Bob to Alice: Bob → M3: EM3(M2,k3,EM2(M1,k2,EM1(Alice,k1,EAlice(K)))), MM3 → M2: EM2(M1,k2,EM1(Alice,k1,EAlice(K))), Ek3(M)

M2 → M1: EM1(Alice,k1,EAlice(K)), Ek2(Ek3(M))

M1 → Alice: EAlice(K), Ek1(Ek2(Ek3(M)))

Alice can be memoryless:ki = h(K, i)

Page 24: Network Security:  Anonymity

Low-latency anonymous routing

24

Page 25: Network Security:  Anonymity

25

Tor“2nd generation onion router”Mix networks are ok for email but too slow for interactive use like web browsingNew compromise between efficiency and anonymity:

No mixing at the onion routersAll packets in a session, in both directions, go through the same routers Short route, always three onion routersTunnels based on symmetric cryptographyNo cover trafficProtects against local observers at any part of the path, but vulnerable to a global attacker

More realistic attacker model: can control some nodes, can sniff some links, not everythingSOCKS interface at clients → works for any TCP connection

Page 26: Network Security:  Anonymity

26

Tunnels in TorAlice OR1 OR2 OR3 Bob

Authenticated DHAlice – OR1

Authenticated DH, Alice – OR2

K1

Encrypted with K1

K2

Authenticated DH, Alice – OR3

Encrypted with K1, K2

Encrypted with K1, K2, K3

K3

[Danezis]

Last link unencrypted

Alice not authenticated,

only the ORs

K1

TCP connection Alice –Bob

K1,K2

K1,K2,K3

Page 27: Network Security:  Anonymity

27

Tunnels in TorAlice OR1 OR2 OR3 Bob

Authenticated DHAlice – OR1

Authenticated DH, Alice – OR2

K1

Encrypted with K1

K2

Authenticated DH, Alice – OR3

Encrypted with K1, K2

Encrypted with K1, K2, K3

K3

[Danezis]

Last link unencrypted

Alice not authenticated,

only the ORs

K1

TCP connection Alice –Bob

K1,K2

K1,K2,K3 Additionally, linkwise TLS connections:

Alice–OR1–OR2–OR3

Page 28: Network Security:  Anonymity

28

Tor limitations (1)Identifying packet streams is very easy

Passive fingerprinting by packet size, timingActive traffic shaping (stream watermarking)

→ Anonymity compromised if attacker can see or control the first and last link

Long routes don’t help if the attacker owns the first and last ORIf c is the fraction of compromised ORs, probability of compromise is c2

Why three routers, not two?Out of habit?Attacker in control of first or last router cannot immediately go and compromise the other one when there is a middle router

Page 29: Network Security:  Anonymity

29

Tor limitations (2)Client must know the addresses and public keys of all onion routers

If client only knows a small subset of routers, it will always choose all three routers from this subset → implicit identifierE.g. client knows 10 out of 1000 routers = 1% → Attacker in control of the last router can narrow down the client identity to (0.01)2 = 0.01% of all clients→ Attacker in control of two last routers can narrow the client identity down to (0.01)3 = 0.0001% of all clients

Blacklisting of entry or exit nodes

Page 30: Network Security:  Anonymity

30

FreenetFreenet is a DHT-based P2P content distribution systemFocus on sensorship resistant publishing

Plausible deniability for content publishers and redistributorsNode itself cannot determine what content it stores

Page 31: Network Security:  Anonymity

31

Applications of anonymous routingCensorship resistance, freedom or speechProtection against discrimination, e.g. geographic access control or price differentiationBusiness intelligence, police investigation, political and military intelligence Whistle blowing, crime reportingElectronic votingCyber war, crime, illegal and immoral activities?

Page 32: Network Security:  Anonymity

32

ExercisesCompare k-anonymity for senders in threshold mix and pool mixWhat can a malicious Tor exit node achieve?Compare how the following affect anonymity level in Tor and high-latency email mixes:

Percentage of compromised mixesNumber of mixes in the routeChoosing a new random route periodically

Is it possible to provide anonymity to honest users without helping criminals?Learn about the latest attacks against Tor. New ones are published regularly. Why is this the case?Is Tor use unobservable? That is, can it be used safely in a country or workplace where its use may be punished?Could malware or other software on your computer leak information about which web sites you access with Tor (or to whom you send email through a mix network)?