Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS 2002

Slides:



Advertisements
Similar presentations
SPATor: Improving Tor Bridges with Single Packet Authorization Paper Presentation by Carlos Salazar.
Advertisements

Tor: The Second-Generation Onion Router
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems Yingwu Zhu and Yiming Hu University of Cincinnati.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
IUT– Network Security Course 1 Network Security Firewalls.
4/27/2015Slide 1 Rethinking the design of the Internet: The end to end arguments vs. the brave new world Marjory S. Blumenthal Computer Science and Telecomms.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Modelling and Analysing of Security Protocol: Lecture 10 Anonymity: Systems.
Use Cases for I2RS I2RS Interim Meeting Nicolai Leymann, Deutsche Telekom AG
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
How Much Anonymity does Network Latency Leak? Paper by: Nicholas Hopper, Eugene Vasserman, Eric Chan-Tin Presented by: Dan Czerniewski October 3, 2011.
Presentation on: Tarzan: A Peer-to-Peer Anonymizing Network Layer Steffen Schott Computer Networks and Telematics, Freiburg Prof. Dr. Christian Schindelhauer.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Building a Peer-to-Peer Anonymizing Network Layer Michael J. Freedman NYU Dept of Computer Science Public Design Workshop September 13,
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
CMSC 414 Computer (and Network) Security Lecture 16 Jonathan Katz.
The Case for Network-Layer, Peer-to-Peer Anonymization Michael J. Freedman Emil Sit, Josh Cates, Robert Morris MIT Lab for Computer Science IPTPS’02March.
Analysis of Onion Routing Presented in by Jayanthkumar Kannan On 10/8/03.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
Circuit & Application Level Gateways CS-431 Dick Steflik.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Preventing Active Timing Attacks in Low- Latency Anonymous Communication The 10 th Privacy Enhancing Technologies Symposium July 2010 Joan Feigenbaum Yale.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Network Address Translation (NAT) CS-480b Dick Steflik.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Chapter 13 – Network Security
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms David Chaum CACM Vol. 24 No. 2 February 1981 Presented by: Adam Lee 1/24/2006 David.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Anonymous Communication -- a brief survey
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Lecture 14: Anonymity on the Web (cont) Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Firewall Security.
Resilient Overlay Networks Robert Morris Frans Kaashoek and Hari Balakrishnan MIT LCS
1 SOS: Secure Overlay Services A. D. Keromytis V. Misra D. Runbenstein Columbia University.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Computer Networking P2P. Why P2P? Scaling: system scales with number of clients, by definition Eliminate centralization: Eliminate single point.
Anonymity - Background R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
CSE 592 INTERNET CENSORSHIP (FALL 2015) LECTURE 22 PHILLIPA GILL - STONY BROOK U.
Ways to reduce the risks of Crowds and further study of web anonymity By: Manasi N Pradhan.
Onion Routing R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
1 Objectives Identify the basic components of a network Describe the features of Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Confidentiality using Conventional Encryption Chapter 5.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Computer Science Graduate Student Jinhae Kim
What's the buzz about HORNET?
0x1A Great Papers in Computer Security
Presentation transcript:

Tarzan: A Peer-to-Peer Anonymizing Network Layer Michael J. Freedman, NYU Robert Morris, MIT ACM CCS

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 2 Participant can communicate anonymously with non-participant User can talk to CNN.com User ? ? Nobody knows who user is The Grail of Anonymization

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 3 Our Vision for Anonymization Thousands of nodes participate Bounce traffic off one another Mechanism to organize nodes: peer-to-peer All applications can use: IP layer

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 4 Alternative 1: Proxy Approach Intermediate node to proxy traffic Completely trust the proxy Anonymizer.com User Proxy

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 5 Threat model Corrupt proxy(s) –Adversary runs proxy(s) –Adversary targets proxy(s) and compromises, possibly adaptively Network links observed –Limited, localized network sniffing –Wide-spread (even global) eavesdropping e.g., Carnivore, Chinese firewall, ISP search warrants

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 6 Failures of Proxy Approach User Proxy Traffic analysis is easy Proxy reveals identity Proxy

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 7 Proxy Failures of Proxy Approach User X X CNN blocks connections from proxy Traffic analysis is easy Adversary blocks access to proxy (DoS) Proxy reveals identity

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 8 Alternative 2: Centralized Mixnet User Relay MIX encoding creates encrypted tunnel of relays –Individual malicious relays cannot reveal identity Packet forwarding through tunnel Onion Routing, Freedom Small-scale, static network Relay

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 9 Failures of Centralized Mixnet CNN blocks core routers X Relay User

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 10 Relay Failures of Centralized Mixnet CNN blocks core routers Adversary targets core routers Relay User

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 11 CNN blocks core routers Adversary targets core routers So, add cover traffic between relays –Hides data traffic among cover Alternative 2: Centralized Mixnet Relay User Relay

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 12 Failures of Centralized Mixnet CNN blocks core routers Adversary targets core routers Relay User

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 13 Failures of Centralized Mixnet CNN blocks core routers Adversary targets core routers Still allows network-edge analysis Relay User Relay

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 14 Failures of Centralized Mixnet Internal cover traffic does not protect edges External cover traffic prohibitively expensive? –n 2 communication complexity Relay User Relay

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 15 No distinction between anon proxies and clients –Peer-to-peer model Anonymity against corrupt relays –MIX-net encoding –Robust tunnel selection –Prevent adversary spoofing or running many nodes Anonymity against global eavesdropping –Cover traffic protects all edges –Restrict topology to make cover practical –Choose neighbors in verifiably-random manner Application-independence –Low-latency IP-layer redirection Tarzan goals

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 16 Tarzan: Me Relay, You Relay Thousands of nodes participate –CNN cannot block everybody –Adversary cannot target everybody

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 17 Tarzan: Me Relay, You Relay Thousands of nodes participate Cover traffic protects all nodes –Global eavesdropping gains little info

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 18 Benefits of Peer-to-Peer Design ? ? ? ? ? Thousands of nodes participate Cover traffic protects all nodes All nodes also act as relays –No network edge to analyze –First hop does not know he’s first

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 19 No distinction between anon proxies and clients –Peer-to-peer model Anonymity against corrupt relays –MIX-net encoding –Robust tunnel selection –Prevent adversary spoofing or running many nodes Anonymity against global eavesdropping –Cover traffic protects all nodes –Restrict topology to make cover practical –Choose neighbors in verifiably-random manner Application-independence –Low-latency IP-layer redirection Tarzan goals

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage Contacts known peers to learn neighbor lists 2. Validates each peer by directly pinging Tarzan: Joining the System User

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 21 Tarzan: Generating Cover Traffic 4. Nodes begin passing cover traffic with mimics: –Nodes send at some traffic rate per time period –Traffic rate independent of actual demand –All packets are same length and link encrypted User

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 22 Tarzan: Selecting tunnel nodes User 5. To build tunnel: Iteratively selects peers and builds tunnel from among last-hop’s mimics PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 23 But, Adversaries Can Join System User PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 24 But, Adversaries Can Join System User Adversary can join more than once by spoofing addresses outside its control Contact peers directly to validate IP addr and learn PK PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 25 But, Adversaries Can Join System User Adversary can join more than once by running many nodes on each machine it controls Randomly select by subnet “domain” (/16 prefix, not IP) PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 26 But, Adversaries Can Join System User Adversary can join more than once by running many nodes on each machine it controls Randomly select by subnet “domain” (/16 prefix, not IP) PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 27 But, Adversaries Can Join System User Colluding adversary can only select each other as neighbors Choose mimics in universally-verifiable random manner PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 28 H( ) Tarzan: Selecting mimics 3. Nodes pair-wise choose (verifiable) mimics User H 2 (U.IP) H 4 (U.IP)H 3 (U.IP) H i (A.IP) H i (B.IP)H i (C.IP) CB A H( ) H( ) H( ) H(13.1) H(128.2) H( ) H(18.26) K16 = H(H(U.IP/16)) lookup(K16) D K32 = H(H(U.IP)) lookup(K32) IP/16 IP

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 29 No distinction between anon proxies and clients –Peer-to-peer model Anonymity against corrupt relays –MIX-net encoding –Robust tunnel selection –Prevent adversary spoofing or running many nodes Anonymity against global eavesdropping –Cover traffic protects all nodes –Restrict topology to make cover practical –Choose neighbors in verifiably-random manner Application-independence –Low-latency IP-layer redirection Tarzan goals

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 30 Tarzan: Building Tunnel 5. To build tunnel: Public-key encrypts tunnel info during setup Maps flowid  session key, next hop IP addr User Tunnel Private Address Public Alias Address Real IP Address PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 31 PNAT Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User APP Diverts packets to tunnel source router IP X

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 32 IP Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User APP IP NATs to private address x.x Pads packet to fixed length PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 33 IP Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User APP IP Layer encrypts packet to each relay Encapsulates in UDP, forwards to first hop PNAT IP

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 34 Strips off encryption Forwards to next hop within cover traffic Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User IP APP PNAT Somebody (IP) speaking to CNN IP

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 35 IP NATs again to public alias address Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User APP PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 36 Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User APP Reads IP headers and sends accordingly IP I’m speaking to PNAT PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 37 Response repeats process in reverse IP Tarzan: Tunneling Data Traffic 6. Reroutes packets over this tunnel User IP APP IP PNAT IP

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 38 Integrating Tarzan Can build double-blinded channels Use transparently with existing systems Peer Speakin g to Peer Speakin g to PNAT

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 39 Packet forwarding and tunnel setup Tunnel Setup (public key ops) ~30 msec / hop latency + network delay Packet forwarding (without cover traffic) pkt sizelatencythroughput 64 bytes 250 µsec7 Mbits/s 1024 bytes600 µsec60 MBits/s

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 40 Summary Application-independence at IP layer –Previous systems for , web, file-sharing, etc. No network edge through peer-to-peer design –Core routers can be blocked, targetted, or black-box analyzed Anonymity against corrupt relays and global eavesdropping –Cover traffic within restricted topology –MIX-net tunneling through verified mimics Scale to thousands –Towards a critical mass of users

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 41

November 20, 2002 Tarzan: a Peer-to-Peer Anonymizing Network LayerPage 42 Packet forwarding and tunnel setup (msec)