A Formal Treatment of Onion Routing
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Anoa: a Framework for Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties
AnoA: A Framework For Analyzing Anonymous Communication Protocols Unified Definitions and Analyses of Anonymity Properties Michael Backes1;2 Aniket Kate3 Praveen Manoharan1 Sebastian Meiser1 Esfandiar Mohammadi1 1 Saarland University, 2 MPI-SWS, 3 MMCI, Saarland University {backes, manoharan, meiser, mohammadi}@cs.uni-saarland.de [email protected] February 6, 2014 Abstract Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well- established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. We exemplify the applicability of AnoA for analyzing real-life systems by conducting a thorough analysis of the anonymity properties provided by the Tor network against passive adversarys. Our analysis significantly improves on known anonymity results from the literature. Note on this version Compared to the CSF version [BKM+13], this version enhances the AnoA framework by making the anonymity definitions as well as the corresponding privacy games adaptive. -
Network Anonymity
Network Anonymity Kenan Avdic´∗ and Alexandra Sandstrom¨ y Email: f∗kenav350, [email protected] Supervisor: David Byers, [email protected] Project Report for Information Security Course Linkopings¨ universitet, Sweden Abstract Nevertheless, obtaining anonymity on the internet can be a difficult matter, depending on what degree of In this paper we intend to examine to what degree it anonymity is required. Invariably, the Internet protocol is currently possible to achieve anonymity, with special version 4 has a destination IP-address (and so it will in emphasis on the Internet. We also intend to examine the the future with IPv6) that can be traced to a physical availability of such techniques for an average internet interface, i.e. a computer and its location and possibly the user. There is a historical and current perspective in- owner or user. Currently, discovering someone’s identity cluded, from mix-nets to today’s systems such as Tor, can be done via the internet service provider, and can Freenet and others. We discuss the efficiency of these in some countries be, due to recent increasingly harsher systems and their vulnerabilities. Finally, we discuss intellectual property legislation, a trivial matter. Due the results from a technical and social point of view to obvious technology limitations it is not possible to on anonymity and privacy, both on the Internet and in achieve total anonymity, as the unique IP-address must general. be available for communication. Thus, in order to achieve a measurable degree of anonymity, one cannot rely on 1. Introduction the secrecy of an IP-address, i.e. -
Anonymous Communication on the Internet
Proceedings of Informing Science & IT Education Conference (InSITE) 2014 Cite as: Grahn, K. J., Forss, T., & Pulkkis, G. (2014). Anonymous communication on the internet. Proceedings of In- forming Science & IT Education Conference (InSITE) 2014 (pp. 103-120). Retrieved from http://Proceedings.InformingScience.org/InSITE2014/InSITE14p103-120Grahn0483.pdf Anonymous Communication on the Internet Kaj J. Grahn, Thomas Forss, and Göran Pulkkis Arcada University of Applied Sciences, Helsinki, Finland [email protected] [email protected] [email protected] Abstract There are many kinds of systems developed for anonymous communication on the internet. We survey a number of systems and evaluate their security. Among these systems we compare func- tionalities like Onion Routing, anonymous VPN services, probabilistic anonymity, and determin- istic anonymity. Other types of anonymous communication such as messaging, peer-to-peer communication, web use, emailing, and use of other Internet applications are also presented. We follow up by presenting different types of attacks with the purpose of identifying anonymously communicating users. These attacks fall into the following categories: internal/external attacks, passive/active attacks, and static/adaptive attacks. We describe the following attacks as well as known protections against these attacks: predecessor attacks, intersection attacks, timing attacks, and Sybil attacks. Lastly we discuss design choices, operation, and security of the current TOR network – The 2G Onion Router. Access -
A Survey of Anonymous Communication Channels
Journal of Privacy Technology 20060701001 A Survey of Anonymous Communication Channels George Danezis [email protected] K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium. Claudia Diaz [email protected] K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium. Abstract We present an overview of the field of anonymous communications, from its establishment in 1981 from David Chaum to today. Key systems are presented categorized according to their underlying principles: semi-trusted relays, mix systems, remailers, onion routing, and systems to provide robust mixing. We include extended discussions of the threat models and usage models that different schemes provide, and the trade-offs between the security properties offered and the communication characteristics different systems support. Keywords: Anonymous communications, Mix systems, Traffic analysis, Privacy. 1. Introducing Anonymous Communications Research on anonymous communications started in 1981 with Chaum’s seminal paper “Untrace- able electronic mail, return addresses, and digital pseudonyms” (Chaum (1981)). Since then, a body of research has concentrated on building, analyzing and attacking anonymous communica- tion systems. In this survey we look at the definition of anonymous communications and the major anonymous communication systems grouped in families according to the key design decisions they are based on. Data communication networks use addresses to perform routing which are, as a rule, visible to anyone observing the network. Often addresses (such as IP addresses, or Ethernet MACs) are a unique identifier which appear in all communication of a user, linking of all the user’s transactions. Furthermore these persistent addresses can be linked to physical persons, seriously compromis- ing their privacy. -
Quantitative Anonymity Guarantees for Tor
Saarland University Faculty of Mathematics and Computer Science Quantitative Anonymity Guarantees for Tor Dissertation zur Erlangung des Grades des Doktors der Ingenieurwissenschaften der Fakult¨at f¨urMathematik und Informatik der Universit¨atdes Saarlandes von Sebastian Wilhelm Ludwig Meiser Saarbr¨ucken, Februar 2016 Day of Colloquium 23. November 2016 Dean of the faculty Prof. Dr. Frank-Olaf Schreyer Chair of the Committee Prof. Dr. Christian Rossow Reviewers Prof. Dr. Michael Backes Prof. Aniket Kate, Ph.D. Dr. George Danezis Academic Assistant Dr. Robert K¨unnemann ii Zusammenfassung In dieser Arbeit pr¨asentieren wir eine neue Methode, um beweisbar sichere Anony- mit¨atsgarantien f¨urProtokolle zur anonymen Kommunikation zu geben und veran- schaulichen die Anwendung dieser Methode anhand des Tor Protokolls. Zu diesem Zweck pr¨asentieren wir zun¨achst das AnoA Framework, welches dazu dient, die Anony- mit¨atvon Protokollen zur anonymen Kommunikation zu quantifizieren. Der Angreifer, der in AnoA betrachtet wird, ist modular konfigurierbar. Wir zeigen, wie das Tor Protokoll in einer abstrakten Weise analysiert werden kann und greifen hierbei auf eine existierende Formalisierung von Tor im Universal Composibility (UC) Frame- work zur¨uck. Wir beweisen, dass unsere abstrakten Betrachtungen sichere Garantien ergeben. Dar¨uber hinaus entwickeln wir effizient berechenbare und beweisbar sichere Formeln, mit denen sich die Sicherheit von Tor gegen¨uber von Angreifern, die entweder durch Besitz eigener Tor Server oder durch eine Uberwachung¨ der Kommunikation, auf eine passive Art versuchen, die Anonymit¨atzu brechen. Letztlich f¨uhrenwir eine umfassende Analyse des Tor Netzwerks durch und berechnen die Anonymit¨at,die Tor gegen eine Vielzahl solcher Angreifer zur Verf¨ugung stellt, basierend auf den technischen Eigenschaften von Tor's Pfadsuchalgorithmus (und einigen Alternativen). -
Social Networking for Anonymous Communication Systems: a Survey
Social Networking for Anonymous Communication Systems: A Survey Rodolphe Marques Andre´ Zuquete´ Instituto de Telecomunicac¸oes˜ Universidade de Aveiro/IEETA Aveiro, Portugal Aveiro, Portugal [email protected] [email protected] Abstract relay node. This leaves a door open to malicious behavior in the network, where an attacker can run one or several Anonymous communication systems have been around for relay nodes in the network in an attempt to undermine the sometime, providing anonymity, enhanced privacy, and cen- anonymity that these networks provide to their clients. sorship circumvention. A lot has been done, since Chaum’s Attacks on anonymous communication systems have been seminal paper on mix networks, in preventing attacks able thoroughly studied, most of them being passive attacks to undermine the anonymity provided by these systems. through traffic analysis. The most common attacks are the This, however, is a difficult goal to achieve due to the de- predecessor attack [1], the intersection attacks [2], timing centralized nature of these systems. In the end it boils down attacks [3], and Sybil attacks [4]. These attacks can be to finding a subset of trusted nodes to be placed in critical easily performed by controlling some specific relay nodes in positions of the communication path. But the question re- the circuits created by the clients. Timing attacks are more mains: ”How to know if a given node can be trusted?”. In critical in low latency anonymity networks and are extremely this paper we present a survey of a new research area which difficult to detect do to their passive nature. -
Arxiv:1803.02816V1 [Cs.NI] 7 Mar 2018
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research Saad Saleha,∗, Junaid Qadirb, Muhammad U. Ilyasa,c aSchool of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad-44000, Pakistan bInformation Technology University, Lahore, Pakistan cDepartment of Computer Science, Faculty of Computing and Information Technology, University of Jeddah, Jeddah, Mecca Province 21589, Saudi Arabia Abstract Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network. Our research shows that `security' and `anonymity' are the most frequent keywords associated with Tor research studies. Quantitative analysis shows that the majority of research studies on Tor focus on `deanonymization' the design of a breaching strategy. The second most frequent topic is analysis of path selection algorithms to select more resilient paths. Analysis shows that the majority of experimental studies derived their results by deploying private testbeds while others performed simulations by developing custom simulators. No consistent parameters have been used for Tor performance analysis. The majority of authors performed throughput and latency analysis. Keywords: Tor; Security; Anonymity; Survey; Analysis; Deanonymization; Breaching; Path selection; Performance analysis. 1. Introduction In this paper, we survey various studies conducted on the Tor network covering the scope of these studies. We The Internet has revolutionized the world by trans- quantify the studies into three broad but distinct groups, forming it into a global entity. -
Anoa: a Framework for Analyzing Anonymous Communication Protocols? Anonymity Meets Differential Privacy
AnoA: A Framework For Analyzing Anonymous Communication Protocols? Anonymity meets differential privacy Michael Backes1;3, Aniket Kate2, Praveen Manoharan3, Sebastian Meiser3, and Esfandiar Mohammadi3 1 MPI-SWS 2 MMCI, Saarland University 3 Saarland University {backes,manoharan,meiser,mohammadi}@cs.uni-saarland.de [email protected] Abstract. Protecting individuals' privacy in online communications has become a challenge of paramount importance. To this end, anonymous communication (AC) protocols such as the widely used Tor network have been designed to provide anonymity to their participating users. While AC protocols have been the subject of several security and anonymity analyses in the last years, there still does not exist a framework for analyzing complex systems such as Tor and their different anonymity properties in a unified manner. In this work we present AnoA: a generic framework for defining, analyzing, and quantifying anonymity properties for AC protocols. AnoA relies on a novel relaxation of the notion of (computational) differential privacy, and thereby enables a unified quantitative analysis of well-established anonymity properties, such as sender anonymity, sender unlinkability, and relationship anonymity. While an anonymity analysis in AnoA can be conducted in a purely information theoretical manner, we show that the protocol's anonymity properties established in AnoA carry over to secure cryptographic instantiations of the protocol. 1 Introduction Privacy enhancing technologies, such as anonymous communication (AC) proto- cols, seek to protect users' privacy by anonymizing their communication over the Internet. Employing AC protocols has become increasingly popular over the last decade. This popularity is exemplified by the success of the Tor network [40].