Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Lorrie Cranor AT&T Labs Avi Rubin AT&T Labs Marc Waldman
Publius: A robust, tamper-evident, censorship-resistant web publishing system By Waldman, Rubin, and Cranor Presented by Marco Barreno October 8th, 2003.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
PART 6 Application Layer
Censorship-Resistant Publishing Systems Marc Waldman Computer Science Department New York University.
The Internet Useful Definitions and Concepts About the Internet.
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
Computers and Society Carnegie Mellon University Spring 2006 Cranor/Tongia/Farber 1 Regulating Online Speech.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Cornell CS502 Web Basics and Protocols CS 502 – Carl Lagoze Acks to McCracken Syracuse Univ.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Identity, Anonymity,
Anonymization and Privacy Services Infranet: Circumventing Web Censorship and Surveillance, Feamster et al, Usenix Security Symposium 2002.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presentation by Theodore Mao CS294-4: Peer-to-peer Systems August 27, 2003.
Data Communications and Networks
INTRODUCTION TO WEB DATABASE PROGRAMMING
IT 210 The Internet & World Wide Web introduction.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Privacy Protecting Technologies. Technology: Value Neutral? Does technology, on average, help or hinder personal privacy?
CP476 Internet Computing Lecture 5 : HTTP, WWW and URL 1 Lecture 5. WWW, HTTP and URL Objective: to review the concepts of WWW to understand how HTTP works.
TCP/IP Protocol Suite 1 Chapter 22 Upon completion you will be able to: World Wide Web: HTTP Understand the components of a browser and a server Understand.
Web application architecture
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2004 Lorrie Cranor 1 Anonymity and Privacy Enhancing.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
World Wide Web Hypertext model Use of hypertext in World Wide Web (WWW) WWW client-server model Use of TCP/IP protocols in WWW.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Freenet: A Distributed Anonymous Information Storage and Retrieval System Presenter: Chris Grier ECE 598nb Spring 2006.
Secure Distributed Document Sharing System Dukyun Nam, Seunghyun Han, CDS&N Lab. ICU.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2005 Lorrie Cranor 1 Identity, Anonymity, and.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Chapter 29 World Wide Web & Browsing World Wide Web (WWW) is a distributed hypermedia (hypertext & graphics) on-line repository of information that users.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
Web Server.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
Freenet: Anonymous Storage and Retrieval of Information
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
1 Chapter 22 World Wide Web (HTTP) Chapter 22 World Wide Web (HTTP) Mi-Jung Choi Dept. of Computer Science and Engineering
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
CISC103 Web Development Basics: Web site:
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Introduction Web Environments
CISC103 Web Development Basics: Web site:
Topic 5: Communication and the Internet
Chapter 27 WWW and HTTP.
Presentation by Theodore Mao CS294-4: Peer-to-peer Systems
Hyper Text Transfer Protocol
Protocol Application TCP/IP Layer Model
Presentation transcript:

Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin AT&T Research

Publius  Pen name used by authors of Federalist Papers  Federalist Papers influential in convincing NY state voters to ratify US constitution.

Why Publish Anonymously?  Political Dissent  “Whistleblowing”  Radical Ideas  Human Rights Reports

Publius Design Goals  Censorship Resistant  Tamper Evident  Source Anonymous  Updateable  Host Content Deniability  Persistent  Extensible  Freely Available

Related Work  Connection Based Anonymity Hide identity of requestor  Location or Author Based Anonymity Hide identity of author or WWW server

Connection Based Anonymity  Anonymizer HTTP proxy URL rewrite  Proxymate Formerly LPWA HTTP Proxy Pseudonym generation

Connection Based Anonymity  Onion Router Mix Network HTTP Proxy Developed  Crowds HTTP request via Crowd Dynamic Path generation

Onion 1 Onion 2 Onion 3 Onion 4 “Hello World” Onion Routing

Connection Based Anonymity  Freedom Similar to Onion Routing Implemented at transport layer Nym creation – allows multiple pseudonyms Supports HTTP, NNTP, POP3, Telnet, etc.

Location Based Anonymity  Rewebber (aka Janus) Author & Connection Based Tool HTTP Proxy URL Rewrite using public key crypto U= E k (M)=Encrypt message M with public key k k (U)

Location Based Anonymity  Taz & Rewebber Computers with public/private key pair Each runs HTTP proxy server Encryption similar to onion-routing TAZ servers translate name.taz to address Down server = document irretrievable AYATTENTIONTOTHESPEAKER

Eternity Service  Ross Anderson (Univ. of Cambridge)  Network of servers – resists DOS attacks  Fee based  Files cannot be removed or updated  Digital Libraries

Eternity Systems  Usenet Eternity Scaled Down Eternity System Usenet is storage medium Formatting using PGP, SHA1 Send to alt.anonymous.messages Server caches and performs updates Connect via WWW browser

Eternity Inspired Systems  Freenet “Adaptive Network” Local caching Anonymous query, retrieval  Intermemory Self-replicating persistant RAM Donate hard disk space

File Sharing Systems  Napster Peer-to-peer file sharing Peers can capture IP address or peer  Gnutella Anonymous query Peer to peer file transfer, IP capture

Publius Overview Publius Content – Static content (HTML, images, PDF, etc) with desired properties.  Publishers – Post Publius content  Servers – Host Publius content  Retrievers – Browse Publius content

Publius Servers whitehouse.gov library.fr publius.uk Publius Server Table publius.uk library.fr whitehouse.gov

Publish Operation D = Document To Publish K=Key Shamir Secret Sharing Share 1 Share 2 Share 3 K Share 4 MD5 ( D. Share i ) / Mod 5 = Index Into Server Table Index 0 = Index 3 = Store D encrypted under K, and one Share on Server

Publish Overview  Servers available to store content  Encrypt document with secret key K  Secret split key K into (m,k) shares (Shamir)  Store encrypted document and share on m servers  Form URL cryptographically tied to document  Distribute URL – Publius URL readingthis=12asbnm8945

Retrieve Overview  Break apart URL to discover document locations  Retrieve encrypted document and share from k locations  Reassemble Key K from shares  Decrypt retrieved document  Check for tampering  View in WWW browser

Retrieve Operation Share 1 )MD5 (D. Share 2 )… Index = MD5(D. Share 1 ) Mod Table_Size From Get Encrypted File, Share Key = combine Shares D = Decrypt File with Key Tamper Check = MD5(D. Share 1 ) = value in URL

Tradeoffs  N = # servers with Content & Share  K = # Shares needed to reconstruct the Key  Higher N Greater availability Harder to censor  Higher K Decreased performance Greater tamper protection Possibly Easier To Censor

Update and Delete Operations  Update – “update” file, MD5(password. IP)  Delete – MD5(password. IP)  Threats – Place update file on server Brute force to delete files  URL contains update bit - Don’t accept updates  Publish Option – No Delete or Update

Mutually Hyperlinked Content Publish B, Modify A, Publish A Publish B First – Invalid A Link Publish A First – Invalid B Link Problem: Content cryptographically tied to URL

Hyperlinked Content Solution Publish A, B Modify A, B Republish A,B Update A,B Hyperlink Update

User Interface Internet Publius Proxy Browser Based GUI Store MIME type in first three bytes of file Send correct Content-Type to browser

Threats & Limitations Share Deletion or Corruption Update File Deletion or Corruption Denial of Service Attacks Threats to Publisher Anonymity “Rubber-Hose Cryptanalysis”

Live Trial (8/7/2000) 3 Week Server Recruitment Period 100 Volunteers, Test Script distributed 53 successfully installed test script 44 successfully installed. Proxy - server version of client, 9 volunteers Must trust proxy – see file, password for Publish Sees URL for retrieve Over 550 client requests

Contributions & Availability Automatic Tamper Checking Mechanism Update / Delete Method Publishing Mutually Hyperlinked Content 1500 Lines of Perl Uses Crypto – Crypto Library (C++)

Future Work  Remove dependence on server list - URL encodes locations, tamper check  Split content - Krawczyk – Information Dispersal  CPU payment scheme (Dwork, Naor)  Automatic replication across servers - Intermemory model

Publius WWW Site Source Code & Technical Paper