Download A Survey Amonymity and Amonymous File Sharing

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Airborne Networking wikipedia , lookup

AppleTalk wikipedia , lookup

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

I²C wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

CAN bus wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Routing wikipedia , lookup

Kademlia wikipedia , lookup

Peer-to-peer wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Modelling and Analysing of
Security Protocol: Lecture 10
Anonymity: Systems
Today’s Lecture
• Practical course issues.
• Theoretical anonymity.
– Dinning Cryptographers Protocol
– Definitions of Anonymity
– The Crowds Protocol
BREAK
• Practical anonymous systems
–
–
–
–
Onion Routing and the Tor System
Mix Networks
Anonymous File-sharing Systems: MUTE
Anonymous Publishing: Freenet
Crowds
• A crowd is a group of n nodes
• The initiator selects randomly a node (called
forwarder) and forwards the request to it
• A forwarder:
– With prob. 1-pf selects
randomly a new node and
forwards the request to him
– With prob. pf sends the
request to the server
server
Crowds
• The sender is beyond suspicion to the server.
• Some of the nodes could be corrupted.
• The initiator could forward the message to a
corrupted node.
• The sender has probable innocence to other
nodes.
Crowds
• Problem: many people won’t forward traffic for
others.
• A practical system has to make forwarding
traffic for others optional or controllable.
server
Onion Routing
• Each node makes its key public
• The initiator selects the whole route and encrypts
the message with all keys in reverse order
• Each node unwraps a layer and forwards the
message to the next one
{3,{server,m}k3}k2
{2,{3,{server,m}k3}k2}k1
1
2
{server,m}k3
m
server
3
Onion Routing
• Each node only learns the next one in the path
• End-users can run their own node
– Better anonymity
• or use an existing one
– More efficient
– User's identity is revealed to the node
Tor
• Tor implement this protocol.
• Several hundred volunteer nodes.
• Firefox plug-in.
• Managed by the US navy.
Problems with Tor
• You reveal you IP to the first node and the
last node see who you are talking to.
• If an attacker controls the first and the last
node they may be able to match the packets
using traffic analysis.
• No anonymity from an attacker that monitors
the whole network.
• Some protocol broadcast their IP address
MIXes
• MIXes are proxies that forward messages
between them
• A user contacts a MIX to send a message
• The MIX waits until it has received a number of
messages, then forwards them in different order
MIXes
• It is difficult to trace the route of each
message.
• May provide beyond suspicion S-R
unlinkability even to a global attacker.
• Messages have to be delayed (can be solved
with dummy traffic).
• More complicated when sending series of
packets
Mutli-casting
• Broadcast the message to the whole network.
• Beyond suspicion for the receiver.
• No anonymity for the sender.
• Multicasting is a good technique for
broadcasting messages .... but very inefficient
to send just one message.
Spoofed UDP
• The from IP address is not used by routers,
only by higher-level protocols such as TCP.
• UDP does not have to use this address.
• A random address can be used instead to
provide sender anonymity.
• Method prohibited by many ISPs.
Anonymous File-Sharing system
800,000 downloads
Appeal for donations
Informal description
Source code
Peer-to-Peer File-Sharing
In newer networks peers record the
IP address of other peers.
A searcher sends a request to all
of it’s “neighbours”.
This is forwarded to all of there
neighbours, up to a fixed hops.
A
Peer-to-Peer File-Sharing
The search request includes
A’s IP address.
Any peer with the requested
file contacts A directly.
A
Peer “A” may then request the
file.
Peer-to-Peer File-Sharing
No anonymity from peers inside the
network:
The search message gives the
searcher’s IP address and name
of the files they are looking for.
A
By requesting a file, you can find
out the IP address of all peers
that are offering the file.
MUTE
• MUTE removes the IP address from the file
exchange.
• Peers only know the IP address of their direct
neighbours.
• Peers choose random “pseudo ID”.
• Files are not sent directly between peers. Instead
files are sent via a number of peers.
• MUTE uses a version of the “Ants” ad-hoc routing
protocol.
Anonymity Provided by MUTE
• MUTE makes it hard to link the IP address of
a peer with its pseudo ID.
• Peers only know the ID address's of their
direct neighbours, but not their pseudo ID.
• The network should provide enough cover to
let a neighbour deny using a particular ID.
• If an attacker can completely surround a peer
it looses anonymity.
MUTE: Search
The search takes place as before, but this
time the message uses its pseudo ID as
the “from ID”.
A
A
A
A
A
Each peer builds a routing table by
records the ID and the connection.
A
A probabilistic time-to-live counter limits
the search.
A
A
A
MUTE: Reply
A
B
If B wants to reply it sends a
message to A’s pseudo ID.
A
B
B
A
A
This message is routed using the adhoc routing table.
B
The route to B is also recorded
A
A
A
A
A
Un-forgeable Pseudo IDs
• MUTE using a hash of using authentication
keys as the peers pseudo IDs.
• A peer generates a RSA signature key “kS” and an
authentication key “kA”.
• The message header now has the form:
( to ID, #(kA), message ID-time_stamp,
FLAGS:(SkS(messageID-time_stamp), kA) )
Freenet and Free Haven
• There are a number of “anonymous
publishing system”.
• For example Freenet and the MIX based Free
Haven.
• These systems make the original author of a
file anonymous, not the responder.
• Nodes will often cache files.Therefore you
can “trick” a node into storing and “offering” a
file.
Summary of methods
Some Kinds of Attack
•
•
•
•
•
•
•
•
Timing attacks
System Membership
Time-to-Live Attacks (Mute, Mantis)
Multiple Attackers (Mute)
Statistical Attacks (MIXes)
Forced Repeat (Crowds)
Nodes Joining and Leaving
Denial of Service (Mute)
Today’s Lecture
• Practical course issues.
• Theoretical anonymity.
– Dinning Cryptographers Protocol
– Definitions of Anonymity
– The Crowds Protocol
BREAK
• Practical anonymous systems
–
–
–
–
Onion Routing and the Tor System
Mix Networks
Anonymous File-sharing Systems: MUTE
Anonymous Publishing: Freenet