Presentation is loading. Please wait.

Presentation is loading. Please wait.

Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin.

Similar presentations


Presentation on theme: "Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin."— Presentation transcript:

1 Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin AT&T Research

2 Publius  Pen name used by authors of Federalist Papers  Federalist Papers influential in convincing NY state voters to ratify US constitution.

3 Why Publish Anonymously?  Political Dissent  “Whistleblowing”  Radical Ideas  Human Rights Reports

4 Publius Design Goals  Censorship Resistant  Tamper Evident  Source Anonymous  Updateable  Host Content Deniability  Persistent  Extensible  Freely Available

5 Related Work  Connection Based Anonymity Hide identity of requestor  Location or Author Based Anonymity Hide identity of author or WWW server

6 Connection Based Anonymity  Anonymizer HTTP proxy URL rewrite  Proxymate Formerly LPWA HTTP Proxy Pseudonym generation www.anonymizer.com www.proxymate.com

7 Connection Based Anonymity  Onion Router Mix Network HTTP Proxy Developed  Crowds HTTP request via Crowd Dynamic Path generation www.onion-router.net www.research.att.com/projects/crowds

8 Onion 1 Onion 2 Onion 3 Onion 4 “Hello World” Onion Routing

9 Connection Based Anonymity  Freedom Similar to Onion Routing Implemented at transport layer Nym creation – allows multiple pseudonyms Supports HTTP, NNTP, POP3, Telnet, etc. http://www.freedom.net

10 Location Based Anonymity  Rewebber (aka Janus) www.rewebber.de Author & Connection Based Tool HTTP Proxy URL Rewrite using public key crypto U=http://www.cs.nyu.edu/~waldman/publius.html E k (M)=Encrypt message M with public key k http://www.rewebber.com/surf-encrypted/E k (U)

11 Location Based Anonymity  Taz & Rewebber Computers with public/private key pair Each runs HTTP proxy server Encryption similar to onion-routing TAZ servers translate name.taz to address Down server = document irretrievable www.firstserver.com:100/STOPREADINGTHISANDP AYATTENTIONTOTHESPEAKER

12 Eternity Service  Ross Anderson (Univ. of Cambridge)  Network of servers – resists DOS attacks  Fee based  Files cannot be removed or updated  Digital Libraries

13 Eternity Systems  Usenet Eternity Scaled Down Eternity System Usenet is storage medium Formatting using PGP, SHA1 Send to alt.anonymous.messages Server caches and performs updates Connect via WWW browser

14 Eternity Inspired Systems  Freenet “Adaptive Network” Local caching Anonymous query, retrieval  Intermemory Self-replicating persistant RAM Donate hard disk space

15 File Sharing Systems  Napster Peer-to-peer file sharing Peers can capture IP address or peer  Gnutella Anonymous query Peer to peer file transfer, IP capture

16 Publius Overview Publius Content – Static content (HTML, images, PDF, etc) with desired properties.  Publishers – Post Publius content  Servers – Host Publius content  Retrievers – Browse Publius content

17 Publius Servers whitehouse.gov library.fr publius.uk www.redcross.org www.nyu.edu Publius Server Table publius.uk www.nyu.edu library.fr whitehouse.gov www.redcross.org

18 Publish Operation D = Document To Publish K=Key Shamir Secret Sharing Share 1 Share 2 Share 3 K Share 4 MD5 ( D. Share i ) / Mod 5 = Index Into Server Table Index 0 = www.redcross.org Index 3 = www.nyu.edu Store D encrypted under K, and one Share on Server

19 Publish Overview  Servers available to store content  Encrypt document with secret key K  Secret split key K into (m,k) shares (Shamir)  Store encrypted document and share on m servers  Form URL cryptographically tied to document  Distribute URL – Publius URL http://!publius!/1e6adsg673h0=hgj7889340=yareyou readingthis=12asbnm8945

20 Retrieve Overview  Break apart URL to discover document locations  Retrieve encrypted document and share from k locations  Reassemble Key K from shares  Decrypt retrieved document  Check for tampering  View in WWW browser

21 Retrieve Operation http://!publius!/MD5(D. Share 1 )MD5 (D. Share 2 )… http://!publius!/unReaDableUrL Index = MD5(D. Share 1 ) Mod Table_Size From www.redcross.org Get Encrypted File, Share Key = combine Shares D = Decrypt File with Key Tamper Check = MD5(D. Share 1 ) = value in URL

22 Tradeoffs  N = # servers with Content & Share  K = # Shares needed to reconstruct the Key  Higher N Greater availability Harder to censor  Higher K Decreased performance Greater tamper protection Possibly Easier To Censor

23 Update and Delete Operations  Update – “update” file, MD5(password. IP)  Delete – MD5(password. IP)  Threats – Place update file on server Brute force to delete files  URL contains update bit - Don’t accept updates  Publish Option – No Delete or Update

24 Mutually Hyperlinked Content Publish B, Modify A, Publish A Publish B First – Invalid A Link Publish A First – Invalid B Link Problem: Content cryptographically tied to URL

25 Hyperlinked Content Solution Publish A, B Modify A, B Republish A,B Update A,B Hyperlink Update

26 User Interface Internet Publius Proxy Browser Based GUI http://!publius!/URLhttp://!publius!/PUBLISH http://!publius!/UPDATEhttp://!publius!/DELETE Store MIME type in first three bytes of file Send correct Content-Type to browser

27 Threats & Limitations Share Deletion or Corruption Update File Deletion or Corruption Denial of Service Attacks Threats to Publisher Anonymity “Rubber-Hose Cryptanalysis”

28 Live Trial (8/7/2000) 3 Week Server Recruitment Period 100 Volunteers, Test Script distributed 53 successfully installed test script 44 successfully installed. Proxy - server version of client, 9 volunteers Must trust proxy – see file, password for Publish Sees URL for retrieve Over 550 client requests

29 Contributions & Availability Automatic Tamper Checking Mechanism Update / Delete Method Publishing Mutually Hyperlinked Content 1500 Lines of Perl Uses Crypto++ 3.2 – Crypto Library (C++)

30 Future Work  Remove dependence on server list - URL encodes locations, tamper check  Split content - Krawczyk – Information Dispersal  CPU payment scheme (Dwork, Naor)  Automatic replication across servers - Intermemory model

31 Publius WWW Site Source Code & Technical Paper http://cs.nyu.edu/waldman/publius


Download ppt "Publius A Robust, Tamper Evident, Censorship Resistant WWW Based Publishing System Marc Waldman NYU – CS Dept. Lorrie Cranor AT&T Research Aviel Rubin."

Similar presentations


Ads by Google