Information Hiding: Anonymous Communication

Slides:



Advertisements
Similar presentations
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Advertisements

Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
CS 4700 / CS 5700 Network Fundamentals Lecture 22: Anonymous Communications (Wave Hi to the NSA)
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
6/3/2015topic1 Web Security Qiang Yang Simon Fraser University Thanks: Francis Lau (HKU)
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Copyright Justin Klein Keane InfoSec Training Encryption.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Wireless Security In wireless networks. Security and Assurance - Goals Integrity Modified only in acceptable ways Modified only by authorized people Modified.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
K. Salah1 Security Protocols in the Internet IPSec.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Anonymous routing and mix nets (Tor) Yongdae Kim Significant fraction of these slides are borrowed from CS155 at Stanford 1.
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
CS 3700 Networks and Distributed Systems Anonymous Communications (Wave Hi to the NSA) Revised 8/21/15.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
R. Newman Anonymity - Background. Defining anonymity Defining anonymity Need for anonymity Need for anonymity Defining privacy Defining privacy Threats.
Class 8 Introduction to Anonymity CIS 755: Advanced Computer Security Spring 2015 Eugene Vasserman
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP/IP Model & How it Relates to Browsing the Internet Anonymously BY: HELEN LIN.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
The Silk Road: An Online Marketplace
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
science/internet-intro
Traffic Correlation in Tor Source and Destination Prediction PETER BYERLEY RINDAL SULTAN ALANAZI HAFED ALGHAMDI.
Fall 2006CS 395: Computer Security1 Key Management.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Whatsapp Security Ahmad Hijazi Systèmes de Télécommunications & Réseaux Informatiques (STRI) 20 April 2016.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Hiding in the Dark: The Internet You Cannot See Marc Visnick
Web Applications Security Cryptography 1
CS590B/690B Detecting Network Interference (FALL 2016)
Tor Internals and Hidden Services
Anonymous Communication
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Christo Wilson Revised 8/21/15
Anonymous Communication and Internet Freedom
0x1A Great Papers in Computer Security
Anonymous Communication
The Secure Sockets Layer (SSL) Protocol
Outline Using cryptography in networks IPSec SSL and TLS.
Lecture 10: Network Security.
Public-Key, Digital Signatures, Management, Security
Anonymous Communication
Presentation transcript:

Information Hiding: Anonymous Communication Content may be borrowed from other resources. See the last slide for acknowledgements! Information Hiding: Anonymous Communication Amir Houmansadr CS660: Advanced Information Assurance Spring 2015

Classes of Information Hiding Digital watermarking Steganography Covert channels Anonymous communication Protocol obfuscation CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Definition Hiding the identitie(s) of the parties involved in digital communications from each other, or from third-parties “Who you are” from the communicating party “Who you are talking to” from everyone else CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Why be Anonymous? If you are a cyber-criminal! DRM infringement, hacker, spammer, terrorist, etc. But, also if you are: Journalist Whistleblower Human rights activist Business executive Military/intelligence personnel Abuse victims CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Why be Anonymous? How about normal people? Avoid tracking by advertising companies Protect sensitive personal information from businesses, like insurance companies, banks, etc. Express unpopular or controversial opinions Have a dual life A professor who is also a pro in World of Warcraft! Try uncommon things … It feels good to have some privacy! CS660 - Advanced Information Assurance - UMassAmherst

Bottomline: Anonymity is not for criminals only! CS660 - Advanced Information Assurance - UMassAmherst

But, It’s Hard to be Anonymous! Your network location (IP address) can be linked directly to you ISPs store communications records Usually for several years (Data Retention Laws) Law enforcement can subpoena these records Your application is being tracked Cookies, Flash cookies, E-Tags, HTML5 Storage Centralized services like Skype, Google voice Browser fingerprinting Your activities can be used to identify you Unique websites and apps that you use Types of links that you click CS660 - Advanced Information Assurance - UMassAmherst

But, It’s Hard to be Anonymous! Your Internet access point can be wiretapped Wireless traffic can be trivially intercepted Airsnort, Firesheep, etc. Wifi and Cellular traffic! Encryption helps, if it’s strong WEP and WPA are both vulnerable! Tier 1 ASs and IXPs are compromised NSA, GCHQ, “5 Eyes” ~1% of all Internet traffic Focus on encrypted traffic CS660 - Advanced Information Assurance - UMassAmherst

You Have to Protect at All Layers! Challenge: Maintain Performance CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Definitions CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Types of Anonymity Sender anonymity Receiver anonymity Sender-Receiver anonymity CS660 - Advanced Information Assurance - UMassAmherst

CS660 - Advanced Information Assurance - UMassAmherst Properties Unlinkability: the inability of link two or more items of interests to break anonymity, like packets, events, people, actions, etc. Unobservability: items of interest are indistinguishable from all other items CS660 - Advanced Information Assurance - UMassAmherst

Quantifying Anonymity How can we calculate how anonymous we are? Anonymity Sets Suspects (Anonymity Set) Who sent this message? Larger anonymity set = stronger anonymity

CS660 - Advanced Information Assurance - UMassAmherst Anonymity Systems CS660 - Advanced Information Assurance - UMassAmherst

Crypto (SSL) Content is unobservable Data Traffic Content is unobservable Due to encryption Source and destination are trivially linkable No anonymity!

Anonymizing Proxies Source is known Destination anonymity HTTPS Proxy No anonymity! Source is known Destination anonymity Destination is known Source anonymity

Anonymizing VPNs Source is known Destination anonymity No anonymity! VPN Gateway No anonymity! Source is known Destination anonymity Destination is known Source anonymity

Using Content to Deanonymize HTTPS Proxy Reading Gmail Looking up directions to home Updating your G+ profile Etc… No anonymity! Fact: the NSA leverages common cookies from ad networks, social networks, etc. to track users

Data To Protect Personally Identifiable Information (PII) Name, address, phone number, etc. OS and browser information Cookies, etc. Language information IP address Amount of data sent and received Traffic timing

Some Crypto Background CS660 - Advanced Information Assurance - UMassAmherst

Crypto Algorithms Symmetric algorithms Asymmetric algorithms Conventional algorithms Encryption and decryption keys are the same Examples: DES, 3DES, AES, Blowfish Asymmetric algorithms Commonly known as Public Key algorithms Encryption key and decryption key are different Examples: Diffie-Hellman, RSA, Elliptic curve

Symmetric encryption is reversible Symmetric Key Crypto Let’s say we have a plaintext message M … a symmetric encryption algorithm E … and a key K M  E(K, M) = C  E(K, C) = M Advantages: Fast and easy to use Disadvantages How to securely communicate the key? Cyphertext C Symmetric encryption is reversible

Public Key Crypto Let’s say we have plaintext message M … a public key algorithm F … and two keys KP (public) and KS (private) M  F(KP, M) = C  F(KS, C) = M M  F(KS, M) = C  F(KP, C) = M Encrypt with the public key… Decrypt with the private key

Public Key Crypto in Action KP <KP, KS> KP Safe to distribute the public key KP Can only decrypt with the private key KS Computationally infeasible to derive KS from KP

CS660 - Advanced Information Assurance - UMassAmherst Crowds CS660 - Advanced Information Assurance - UMassAmherst

Crowds Key idea High-level implementation Users’ traffic blends into a crowd of users Eavesdroppers and end-hosts don’t know which user originated what traffic High-level implementation Every user runs a proxy on their system Proxy is called a jondo From “John Doe,” i.e. an unknown person When a message is received, select x [0, 1] If x > pf: forward the message to a random jondo Else: deliver the message to the actual receiver

Crowds Example Links between users use public key crypto Users may appear on the path multiple times Final Destination

Anonymity in Crowds No source anonymity Target receives m incoming messages (m may = 0) Target sends m + 1 outgoing messages Thus, the target is sending something Destination anonymity is maintained If the source isn’t sending directly to the receiver

Anonymity in Crowds Source and destination are anonymous Source and destination are jondo proxies Destination is hidden by encryption

Anonymity in Crowds Destination is known Source is anonymous Obviously O(n) possible sources, where n is the number of jondos

Anonymity in Crowds Destination is known Source is somewhat anonymous Evil jondo is able to decrypt the message Source is somewhat anonymous Suppose there are c evil jondos in the system If pf > 0.5, and n > 3(c + 1), then the source cannot be inferred with probability > 0.5

Other Implementation Details Crowds requires a central server called a Blender Keep track of who is running jondos Kind of like a BitTorrent tracker Broadcasts new jondos to existing jondos Facilitates exchanges of public keys

Summary of Crowds The good: The bad: Crowds has excellent scalability Each user helps forward messages and handle load More users = better anonymity for everyone Strong source anonymity guarantees The bad: Very weak destination anonymity Evil jondos can always see the destination Weak unlinkability guarantees

CS660 - Advanced Information Assurance - UMassAmherst Mixes CS660 - Advanced Information Assurance - UMassAmherst

Mix Networks A different approach to anonymity than Crowds Originally designed for anonymous email David Chaum, 1981 Concept has since been generalized for TCP traffic Hugely influential ideas Onion routing Traffic mixing Dummy traffic (a.k.a. cover traffic)

Mix Proxies and Onion Routing Encrypted Tunnels Mix [KP , KP , KP] <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> <KP, KS> Non-encrypted data E(KP , E(KP , E(KP , M))) = C Mixes form a cascade of anonymous proxies All traffic is protected with layers of encryption

Another View of Encrypted Paths <KP, KS> <KP, KS> <KP, KS>

Return Traffic In a mix network, how can the destination respond to the sender? During path establishment, the sender places keys at each mix along the path Data is re-encrypted as it travels the reverse path <KP1 , KS1> KP1 KP2 KP3 <KP2 , KS2> <KP3 , KS3>

Traffic Mixing Mix collects messages for t seconds Messages are randomly shuffled and sent in a different order Traffic Mixing Hinders timing attacks Messages may be artificially delayed Temporal correlation is warped Problems: Requires lots of traffic Adds latency to network flows Arrival Order Send Order 1 1 4 2 2 3 3 4

Dummy / Cover Traffic Simple idea: Send useless traffic to help obfuscate real traffic

CS660 - Advanced Information Assurance - UMassAmherst Tor Well, not Thor! CS660 - Advanced Information Assurance - UMassAmherst

Tor: The 2nd Generation Onion Router Basic design: a mix network with improvements Perfect forward secrecy Introduces guards to improve source anonymity Introduces sessions for long term communicatios Takes bandwidth into account when selecting relays Mixes in Tor are called relays Introduces hidden services Servers that are only accessible via the Tor overlay

Deployment and Statistics Largest, most well deployed anonymity preserving service on the Internet Publicly available since 2002 Continues to be developed and improved Currently, ~5000 Tor relays around the world All relays are run by volunteers It is suspected that some are controlled by intelligence agencies 500K – 900K daily users Numbers are likely larger now, thanks to Snowden

Celebrities Use Tor

How Do You Use Tor? Download, install, and execute the Tor client The client acts as a SOCKS proxy The client builds and maintains circuits of relays Configure your browser to use the Tor client as a proxy Any app that supports SOCKS proxies will work with Tor All traffic from the browser will now be routed through the Tor overlay

Selecting Relays How do clients locate the Tor relays? Tor Consensus File Hosted by trusted directory servers Lists all known relays IP address, uptime, measured bandwidth, etc. Not all relays are created equal Entry/guard and exit relays are specially labelled Why? Tor does not select relays randomly Chance of selection is proportional to bandwidth Why? Is this a good idea?

Attacks Against Tor Circuits Source: known Dest: unknown Source: unknown Dest: unknown Source: known Dest: known Source: unknown Dest: known Entry/ Guard Middle Exit Tor users can choose any number of relays Default configuration is 3 Why would higher or lower number be better or worse?

Predecessor Attack Assumptions: N total relays M of which are controlled by an attacker Attacker goal: control the first and last relay M/N chance for first relay (M-1)/(N-1) chance for the last relay Roughly (M/N)2 chance overall, for a single circuit However, client periodically builds new circuits Over time, the chances for the attacker to be in the correct positions improves! This is the predecessor attack Attacker controls the first and last relay Probability of being in the right positions increases over time

Guard Relays Guard relays help prevent attackers from becoming the first relay Tor selects 3 guard relays and uses them for 3 months After 3 months, 3 new guards are selected Only relays that: Have long and consistent uptimes… Have high bandwidth… And are manually vetted may become guards Problem: what happens if you choose an evil guard? M/N chance of full compromise

Hidden Services Tor is very good at hiding the source of traffic But the destination is often an exposed website What if we want to run an anonymous service? i.e. a website, where nobody knows the IP address? Tor supports Hidden Services Allows you to run a server and have people connect … without disclosing the IP or DNS name Many hidden services Tor Mail, Tor Char DuckDuckGo Wikileaks The Pirate Bay Silk Road (2.0)

Hidden Service Example Introduction Points https://go2ndkjdf8whfanf4o.onion Hidden Service Rendezvous Point Onion URL is a hash, allows any Tor user to find the introduction points

Perfect Forward Secrecy In traditional mix networks, all traffic is encrypted using public/private keypairs Problem: what happens if a private key is stolen? All future traffic can be observed and decrypted If past traffic has been logged, it can also be decrypted Tor implements Perfect Forward Secrecy (PFC) The client negotiates a new public key pair with each relay Original keypairs are only used for signatures i.e. to verify the authenticity of messages An attacker who compromises a private key can still eavesdrop on future traffic … but past traffic is encrypted with ephemeral keypairs that are not stored

CS660 - Advanced Information Assurance - UMassAmherst Discussion Main challenges? Performance Scalability Resourceful adversaries … Alternatives to Tor? Peer-to-peer structures CS660 - Advanced Information Assurance - UMassAmherst

Classes of Information Hiding Digital watermarking Steganography Covert channels Anonymous communication Protocol obfuscation CS660 - Advanced Information Assurance - UMassAmherst

Acknowledgements Some of the slides, content, or pictures are borrowed from the following resources, and some pictures are obtained through Google search without being referenced below: Most of the slides borrowed (with some changes) from Prof. Christo Wilson’s presentation in NEU CS4700