Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

28
Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University

Transcript of Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Page 1: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Enforcing Anonymity and Improving Pseudonymity in TailsDavid WolinskyYale University

Page 2: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

What Is Nymix

Alice

InternetAlice’s Laptop

Cloud StorageNyms

Page 3: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

The Leaky Boat

Page 4: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Application Level Attacks

Bob’s Booby-trap

Blog

Alice Tor-based Secure Channel

Unsecured Channel:

“Here’s my IP”

Javascript ExploitFreetopia

Repressistan

Alice’s Laptop

Alice in Repressistan

Page 5: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Bob

Correlation Attacks

InternetBob’s Laptop

Bob of Freetopia

Page 6: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Confiscation Attacks

Carol

Carol the Landofopportunian

Border patrol

Page 7: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Attack Recap

Page 8: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Nymix – One Layer Deeper

Alice

InternetAlice’s Laptop

Cloud Storage

Nym Manager

CommVMAnonVM

Page 9: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Attacks Executed in Nymix

Page 10: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Application Level Attacks

Bob’s Booby-trap

Blog

Alice Tor-based Secure Channel

Unsecured Channel:

“Here’s my IP”

Javascript ExploitFreetopia

Repressistan

Alice’s Laptop

Alice in Repressistan

Page 11: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Application Level Attacks

Bob’s Booby-trap

Blog

Alice Tor-based Secure Channel

Javascript ExploitFreetopia

Repressistan

Alice’s Laptop

Alice in Repressistan

Page 12: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Attacks Executed in Nymix

Page 13: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Bob

Correlation Attacks

InternetBob’s Laptop

Bob of Freetopia

Page 14: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Bob

Correlation Attacks

InternetBob’s Laptop

Bob of Freetopia

Alice’s Laptop

Page 15: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Attacks Executed in Nymix

Page 16: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Confiscation Attacks

Carol

Carol the Landofopportunian

Border patrol

Page 17: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Confiscation Attacks

Carol

Carol the Landofopportunian

Page 18: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Confiscation Attacks

Carol

Carol the Landofopportunian

Border patrolX

Page 19: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Attacks Executed in Nymix

Page 20: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Evaluation• I7 – 4 cores at 2.7 GHz• 8 GB Ram• Connects to a test deployment of Tor

• 10 Mbit bandwidth• 200 ms latency• 3 relays

• Nym memory usage• AnonVM – 384 MB RAM, 128 MB Disk (stored in RAM)• CommVM – 128 MB RAM, 16 MB Disk (stored in RAM)

Page 21: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

CPU Evaluations

Page 22: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Memory Usage

Page 23: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Network Overhead

Page 24: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Nymix is not… It is…• Not a complete solution• An exploration of pseudonymity potential with

virtualization

• A ready to use system• A research prototype looking at potential integration

with tails

Page 25: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Implementation• Ubuntu 14.04• Qemu (KVM) for virtualization• OverlayFS for union file system• Google Chromium (required in order to support a

circumvention software)

Page 26: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Integration with Tails• To CommVM or not CommVM

• Each VM is not cheap• Must share a common Tor guard

• Sharing a common base image with Tails• Tails is well hardened• Tails has many configurations undesirable for AnonVM

• Persistence Models• Store all data in the cloud• Encrypted (LUKS) volume, store header elsewhere

Page 27: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Futher Challenges• Resolution of VMM• Fingerprintable CPU• VMM timing channels• Accessing local hardware / data

Page 28: Enforcing Anonymity and Improving Pseudonymity in Tails David Wolinsky Yale University.

Going Forward• Tomorrow – 15:00 – 16:00 – Follow up discussion• Slides available

• PDF http://goo.gl/XUVZmC• PPTX http://goo.gl/0pkHM5

• Text available http://arxiv.org/abs/1312.3665• Github https://github.com/DeDiS/WiNoN