No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference...

51
No Right to Remain Silent: Isolating Malicious Mixes Hemi Leibowitz 1 Ania M. Piotrowska 2 George Danezis 2 Amir Herzberg 3 1 Bar-Ilan University, IL 2 University College London, UK 3 University of Connecticut, US

Transcript of No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference...

Page 1: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

No Right to Remain Silent: Isolating Malicious Mixes

Hemi Leibowitz1 Ania M. Piotrowska2 George Danezis2 Amir Herzberg3

1Bar-Ilan University, IL 2University College London, UK 3University of Connecticut, US

Page 2: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

Page 3: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

“Anonymity loves company”

System Efficiency Security

Onion routing (e.g., Tor)Efficient, low-latency,

practical, popular

Page 4: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

From “Tor: The Second-Generation Onion Router”:

“Tor does not claim to completely solve end-to-end timing or

intersection attacks.”

System Efficiency Security

Onion routing (e.g., Tor)Efficient, low-latency,

practical, popularInsecure against timing attacks

Page 5: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

System Efficiency Security

Onion routing (e.g., Tor)Efficient, low-latency,

practical, popularInsecure against timing attacks

Classic mixnets Efficient, higher latencySecure against global eavesdropper and

curious not malicious servers (mixes)

Page 6: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

System Efficiency Security

Onion routing (e.g., Tor)Efficient, low-latency,

practical, popularInsecure against timing attacks

Classic mixnets Efficient, higher latencySecure against global eavesdropper and

curious not malicious servers (mixes)

Dining Cryptographers networks (DCnets), secure

shuffle

High overhead (computing and/or communication)

Secure against global eavesdropper and malicious servers

Page 7: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (what the paper is all about)

● Anonymity is important and challenging

System Efficiency Security

Onion routing (e.g., Tor)Efficient, low-latency,

practical, popularInsecure against timing attacks

Classic mixnets Efficient, higher latencySecure against global eavesdropper and

curious not malicious servers (mixes)

Miranda's mixnet (this work) Efficient, higher latencySecure against global eavesdropper and

malicious servers (mixes)

Dining Cryptographers networks (DCnets), secure

shuffle

High overhead (computing and/or communication)

Secure against global eavesdropper and malicious servers

Page 8: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Senders Receivers

Page 9: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Mix server

Senders Receivers

Page 10: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Senders Receivers

Mix server

Page 11: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Senders Receivers

Mix server

Page 12: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Senders Receivers

Mix server

Incoming and outgoing messages are unlinkable, to an outside observer

Page 13: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Mix cascade

Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.

Page 14: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Mix cascade

Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.

Page 15: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Mix cascade

Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.

Page 16: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Mix cascade

Chaining mixes in a cascade prevents any single mix from tracking messages end-to-end.

Page 17: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Directoryauthorities

Cascade

Page 18: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Page 19: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

Page 20: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

INTRODUCTION (basic concepts: mix servers, mix cascades and mix net)

A single honest mix in the cascade is enough to provide protection against passive global observer

Page 21: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Alice

Bob

MOTIVATION (why malicious mixes are a threat to mixnets)

Page 22: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Alice

Bob

Alice communicates with Bob!

MOTIVATION (why malicious mixes are a threat to mixnets)

Page 23: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

MIRANDA’S DESIGN (assumptions)

● A fixed set of mixes (no churn)

● More honest mixes than malicious mixes (no Sybil)

● Reliable communication and processing

● Synchronized clocks

Page 24: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

MIRANDA’S DESIGN (challenges)

● Detect attacks by malicious mixes

● Penalize the malicious mix

● Identify the malicious mix

Page 25: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

✔ Detect attacks by malicious mixes

● Penalize the malicious mix

● Identify the malicious mix

MIRANDA’S DESIGN (challenges)

Page 26: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Alice

IDENTIFYING THE MALICIOUS MIX IS CHALLENGING

Page 27: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Alice

My message never arrived to its

destination. Did you forward it?!

IDENTIFYING THE MALICIOUS MIX IS CHALLENGING

Page 28: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

AliceOf course I’ve forwarded it!

My message never arrived to its

destination. Did you forward it?!

Hey!!! I didn’t get this

message!

IDENTIFYING THE MALICIOUS MIX IS CHALLENGING

Page 29: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

AliceOf course I’ve forwarded it!

My message never arrived to its

destination. Did you forward it?!

Hey!!! I didn’t get this

message!

Of course I’ve forwarded it!

My message never arrived to its

destination. Did you forward it?!

Hey!!! I didn’t get this

message!

IDENTIFYING THE MALICIOUS MIX IS CHALLENGING

Alice

Page 30: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

MIRANDA (focus on problematic pair of mixes)

A problematic pair of mixes ⇒ don’t use the link between them

Alice Of course I’ve forwarded it!

My message never arrived to its

destination. Did you forward it?!

Hey!!! I didn’t get this

message!

Page 31: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

A problematic pair of mixes ⇒ don’t use the link between them

Alice

My message never arrived to its

destination. Did you forward it?!

Of course I’ve forwarded it!

MIRANDA (focus on problematic pair of mixes)

Hey!!! I didn’t get this

message!

Page 32: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

In the beginning, everyone are willing to

communicate with each other

M2

M1

M5

M4

M3

Page 33: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 34: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 35: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 36: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 37: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 38: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 39: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 40: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 41: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

Miranda detects problematic pairs involved in active

attacks, and removes their shared links,

eliminating these attack vectors

M2

M1

M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 42: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

M2

M1

The result: malicious mixes are removed from the

system M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 43: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

✔ Detect attacks by malicious mixes

✔ Penalize the malicious mix

➔ Identify the malicious mix

MIRANDA’S DESIGN (challenges)

Page 44: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

M2

M1

The result: malicious mixes are removed from the

system M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 45: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

M2

M1

The result: malicious mixes are removed from the

system M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 46: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

M2

M1

The result: malicious mixes are removed from the

system M5

M4

M3

MIRANDA FROM 10,000 FEET (removing problematic links is a good idea)

Page 47: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

➔ Detect attacks by malicious mixes

✔ Penalize the malicious mix

✔ Identify the malicious mix

MIRANDA’S DESIGN (challenges)

Page 48: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

DETECTING AN ATTACK (using loop messages)

Page 49: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

A LOT MORE IN THE PAPER

● More details

● Community detection techniques: enhanced detection

● Mitigating protocol abuse

● Cascade compilation strategies

● Experimental results

Page 50: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

CONCLUSION

● Miranda is a step in the right direction, but we have not

reached the promised land yet

● Future work

○ Complete (provable) security analysis

○ Relax assumptions towards practicality (e.g., churn)

○ Further reduce latency

Page 51: No Right to Remain Silent : Isolating Malicious Mixes › sites › default › files › conference › protected … · From “Tor: The Second-Generation Onion Router”: “Tor

THANK YOUQuestions?

(for example, why the name Miranda?)

Hemi Leibowitz

[email protected]

Ania M. Piotrowska

[email protected]

George Danezis

[email protected]

Amir Herzberg

[email protected]