The Anonymous File Transfer Network

Slides:



Advertisements
Similar presentations
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
Voice over IP Skype.
Lecture 23 Internet Authentication Applications
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Nym: An anonymous, secure, peer-to-peer instant messenger By Seth Cooper, Adam Hoel, Elliott Hoel, Jeff Holschuh, and Hilde Schmitt.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Access Control in IIS 6.0 Windows 2003 Server Prepared by- Shamima Rahman School of Science and Computer Engineering University of Houston - Clear Lake.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Tor (Anonymity Network) Scott Pardue. Tor Network  Nodes with routers within the network (entry, middle, exit)  Directory servers  Socket Secure (SOCKS)
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
CSCI 6962: Server-side Design and Programming
INE1020: Introduction to Internet Engineering 6: Privacy and Security Issues1 Lecture 9: E-commerce & Business r E-Commerce r Security Issues m Secure.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Anonymity and the Internet Nathan Owens. Overview Regular Internet anonymity Non-standard implementations Benefits Negatives Legal changes Future Ideas.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Web Services Security. Introduction Developing standards for Web Services security – XML Key Management Specification (XKMS) – XML Signature – XML Encryption.
Masud Hasan Secue VS Hushmail Project 2.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Information Security Fundamentals Major Information Security Problems and Solutions Department of Computer Science Southern Illinois University Edwardsville.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Unit 1: Protection and Security for Grid Computing Part 2
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Building Security into Your System Bill Major Gregory Ponto.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Presented by: Sanketh Beerabbi University of Central Florida.
An analysis of Skype protocol Presented by: Abdul Haleem.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
Tor Bruce Maggs relying on materials from
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Tor Bruce Maggs relying on materials from
Skype.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
Systems Architecture Anonymous Key Agreement Dominik Oepen
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
The Secure Sockets Layer (SSL) Protocol
Tor Good + Evil.
Web Services Security.
Tutorial on Creating Certificates SSH Kerberos
Using SSL – Secure Socket Layer
File Transfer Protocol
0x1A Great Papers in Computer Security
The Secure Sockets Layer (SSL) Protocol
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
Electronic Payment Security Technologies
Bruce Maggs relying on materials from
Presentation transcript:

The Anonymous File Transfer Network (AFTN) https://sourceforge.net/projects/aftn/ Jared Rose

What is AFTN? A system for sending files anonymously Uses RSA & digital signatures for establishing a user’s “identity” Utilizes the Tor network SSL Encryption Onion Routing Hidden Services Cross platform compatible Jared Rose

Goals of AFTN Users of the AFTN are anonymous Clients can verify the “identities” of other clients and servers File integrity/validity can be checked MD5 hashing + file size Synchronization of contact information between clients and servers Jared Rose

Goals of AFTN (Continued) Files are protected by end-to-end encryption Tor + Hidden Services Secure updating and management of encryption/signing keys on the server Allow clients to anonymously retrieve key and address information from servers Jared Rose

Why Create AFTN? Digital privacy concerns “Big Government” Whistle blowers Censorship Humanitarian work Its interesting  Jared Rose

Ethical/Legal Concerns Potential for illegal use IP infringement Crime Malicious software/Spam Encryption export laws Open source Jared Rose

How does AFTN work? Two types of hosts: Nodes connected to Tor network Clients Directory Servers Nodes connected to Tor network Outbound connections through Vidalia Inbound connections to server sockets listening at a Tor hidden services address Provides anonymous exchanges between hosts End to end encryption Jared Rose

Clients & Directory Servers Clients register with a directory server Directory servers supply contact info for clients Clients send files to other clients (P2P) Clients know servers contact info through white lists Clients of non-whitelisted servers ignored Permits organizations to be “off the grid” Jared Rose

Tor Provides anonymity through onion routing Hidden Services: NAT/Firewall traversal End to end encryption Hides server locations Bandwidth/Speed are issues Onion routing is bandwidth intensive Speed influence by the types of node you traverse Jared Rose

Anonymity and User Identity Q. If anonymous, how do we know we are talking to the right person? A. Public Key Cryptography! Public/Private signing key Jared Rose

Anonymity and User Identity When clients register with a server: Create unique name/server pair answer (name#server) Register public “master” key used for signing other keys Any changes to keys/information on server must be signed w/ master key Master key can be stored separate from the rest of the system for security Jared Rose

Where are we at Right Now? Jared Rose