P2P File-Sharing in Hell: Exploiting Bittorrent Vulnerabilities to Launch Distributed Reflective Dos Attacks

Total Page:16

File Type:pdf, Size:1020Kb

P2P File-Sharing in Hell: Exploiting Bittorrent Vulnerabilities to Launch Distributed Reflective Dos Attacks Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks Florian Adamsky, Syed Ali Khayam, Rudolf Jäger and Muttukrishnan Rajarajan [email protected] http://florian.adamsky.it/ 9th USENIX Workshop on Offensive Technologies 1/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Outline 1 Introduction Background 2 Amplification Vulnerabilities BitTorrent DHT BitTorrent Sync 3 Experimental Evaluation 4 Countermeasures 2/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Table of Contents 1 Introduction Background 2 Amplification Vulnerabilities BitTorrent DHT BitTorrent Sync 3 Experimental Evaluation 4 Countermeasures 3/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures 2013: DDoS attack record: 300 Gbps 4/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures 2014: DDoS attack record: 400 Gbps 5/34 B BA V Bandwidth Amplification Factor (BAF) BV Christian Rossow introducedBA the Bandwidth Amplification Factor (BAF): j j B Bv BV A BAF = jBaj Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures DRDoS Attacks Thread Model PA PA PA PV PA Attacker Amplifiers Victim 6/34 B V Bandwidth Amplification Factor (BAF) B Christian Rossow introduced the Bandwidth AmplificationV Factor (BAF): jB j BAF = v BV jBaj Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures DRDoS Attacks Thread Model PA BA BA PA PA PV B A PA Attacker Amplifiers Victim 6/34 Bandwidth Amplification Factor (BAF) Christian Rossow introduced the Bandwidth Amplification Factor (BAF): jB j BAF = v jBaj Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures DRDoS Attacks Thread Model PA B BA V BV BA PA PA PV B V A B PA Attacker Amplifiers Victim 6/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures DRDoS Attacks Thread Model PA B BA V Bandwidth Amplification Factor (BAF) BV Christian Rossow introducedBA the Bandwidth Amplification Factor (BAF): PA PA PV j j B Bv BV A BAF = jBaj PA Attacker Amplifiers Victim 6/34 BA = 1 Gbps BV = 5 Gbps Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Example: BAF = 5 PA B BA V BV BA PA PA PV B V A B PA Attacker Amplifiers Victim 7/34 BV = 5 Gbps Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Example: BAF = 5 BA = 1 Gbps PA B BA V BV BA PA PA PV B V A B PA Attacker Amplifiers Victim 7/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Example: BAF = 5 BA = 1 Gbps BV = 5 Gbps PA B BA V BV BA PA PA PV B V A B PA Attacker Amplifiers Victim 7/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Advantages of a DRDoS Attack Attacker hides his own identity It can be initiated by a single computer, results in a distributed attack Amplifiers send a larger packet to the victim and therefore increase the impact of the attack 8/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Worldwide Application Usage 9/34 Source: Paloalto Networks Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Worldwide Application Usage BitTorrent % of total bandwidth: 3.35 % 10/34 Source: Paloalto Networks Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures BitTorrent’s protocol overview Variety of UDP-based protocols are used: Distributed Hash Table (DHT) Micro Transport Protocol (uTP) 11/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Micro Transport Protocol (uTP) uTP is a reliable transport protocol which makes use of UDP Similarities to TCP Window based flow control Sequence numbers and ACK numbers Differences to TCP Sequence numbers and ACKs refer to packets, not bytes No congestion control (Slow-start, congestion avoidance, …) ! LEDBAT Two-way handshake instead of a three-way handshake 12/34 SYN_SENT ST_SYN CONNECTED ST_STATE CONNECTED connection established Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures uTP’s two-way handshake Initiator Receiver 13/34 ST_STATE CONNECTED connection established Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures uTP’s two-way handshake Initiator Receiver SYN_SENT ST_SYN CONNECTED 13/34 connection established Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures uTP’s two-way handshake Initiator Receiver SYN_SENT ST_SYN CONNECTED ST_STATE CONNECTED 13/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures uTP’s two-way handshake Initiator Receiver SYN_SENT ST_SYN CONNECTED ST_STATE CONNECTED connection established 13/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Table of Contents 1 Introduction Background 2 Amplification Vulnerabilities BitTorrent DHT BitTorrent Sync 3 Experimental Evaluation 4 Countermeasures 14/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures BitTorrent Handshake <pstrlen><pstr><extensions><info_hash><peer_id> pstrlen = 19 pstr = BitTorrent protocol extensions 8 bytes reserved info_hash 20 byte peer_id 20 byte 15/34 a) ST_SYN ST_DATA (Handshake) c) ST_STATE ST_DATA (Handshake) b) ST_DATA (Handshake) d) ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim 16/34 ST_DATA (Handshake) c) ST_STATE ST_DATA (Handshake) b) ST_DATA (Handshake) d) ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN 16/34 ST_DATA c) (Handshake) ST_DATA (Handshake) ST_DATA (Handshake) d) ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN ST_STATE b) 16/34 ST_DATA (Handshake) ST_DATA (Handshake) d) ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN ST_DATA (Handshake) c) ST_STATE b) 16/34 ST_DATA (Handshake) ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN ST_DATA (Handshake) c) ST_STATE ST_DATA (Handshake) b) d) 16/34 ST_DATA (Handshake) Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN ST_DATA (Handshake) c) ST_STATE ST_DATA (Handshake) b) ST_DATA (Handshake) d) 16/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Exploiting uTP’s two-way handshake Attacker Amplifier Victim a) ST_SYN ST_DATA (Handshake) c) ST_STATE ST_DATA (Handshake) b) ST_DATA (Handshake) d) ST_DATA (Handshake) 16/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures BV > BA Definition (Packet Stuffing) Try to cram as much BitTorrent messages into one packet as possible to minimize the connection establishment protocol flow 17/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Amplification Factors (BitTorrent) Description BAF PAF ucat 351.5 6 uTorrent w/o extensions 27.6 3.5 Mainline w/o extensions 27.8 3.5 uTorrent with LTEP 39.6 3 Mainline with LTEP 39.6 3 Vuze w/o extensions 13.9 2 Vuze with LTEP 18.7 2 Vuze with AMP 54.3 3.5 Transmission w/o extensions 4.0 3.5 Transmission with LTEP 4.0 3.5 Transmission with AMP 4.0 3.5 Libtorrent w/o extensions 5.2 4 Libtorrent with LTEP 5.2 4 18/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Amplification Factors (BitTorrent) Description BAF PAF ucat 351.5 6 uTorrent w/o extensions 27.6 3.5 Mainline w/o extensions 27.8 3.5 uTorrent with LTEP 39.6 3 Mainline with LTEP 39.6 3 Vuze w/o extensions 13.9 2 Vuze with LTEP 18.7 2 Vuze with AMP 54.3 3.5 Transmission w/o extensions 4.0 3.5 Transmission with LTEP 4.0 3.5 Transmission with AMP 4.0 3.5 Libtorrent w/o extensions 5.2 4 Libtorrent with LTEP 5.2 4 18/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Amplification Factors (BitTorrent) Description BAF PAF ucat 351.5 6 uTorrent w/o extensions 27.6 3.5 Mainline w/o extensions 27.8 3.5 uTorrent with LTEP 39.6 3 Mainline with LTEP 39.6 3 Vuze w/o extensions 13.9 2 Vuze with LTEP 18.7 2 Vuze with AMP 54.3 3.5 Transmission w/o extensions 4.0 3.5 Transmission with LTEP 4.0 3.5 Transmission with AMP 4.0 3.5 Libtorrent w/o extensions 5.2 4 Libtorrent with LTEP 5.2 4 18/34 Introduction Amplification Vulnerabilities Experimental Evaluation Countermeasures Amplification Factors (BitTorrent) Description BAF PAF ucat 351.5 6 uTorrent w/o extensions 27.6 3.5 Mainline w/o extensions 27.8 3.5 uTorrent with LTEP 39.6 3 Mainline with LTEP 39.6 3 Vuze w/o extensions 13.9 2 Vuze with LTEP 18.7 2 Vuze with AMP 54.3 3.5 Transmission w/o extensions 4.0 3.5 Transmission with LTEP 4.0 3.5 Transmission with AMP 4.0 3.5 Libtorrent w/o extensions 5.2 4 Libtorrent with LTEP 5.2 4 18/34 Introduction Amplification Vulnerabilities Experimental
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • Compsci 514: Computer Networks Lecture 13: Distributed Hash Table
    CompSci 514: Computer Networks Lecture 13: Distributed Hash Table Xiaowei Yang Overview • What problems do DHTs solve? • How are DHTs implemented? Background • A hash table is a data structure that stores (key, object) pairs. • Key is mapped to a table index via a hash function for fast lookup. • Content distribution networks – Given an URL, returns the object Example of a Hash table: a web cache http://www.cnn.com0 Page content http://www.nytimes.com ……. 1 http://www.slashdot.org ….. … 2 … … … • Client requests http://www.cnn.com • Web cache returns the page content located at the 1st entry of the table. DHT: why? • If the number of objects is large, it is impossible for any single node to store it. • Solution: distributed hash tables. – Split one large hash table into smaller tables and distribute them to multiple nodes DHT K V K V K V K V A content distribution network • A single provider that manages multiple replicas. • A client obtains content from a close replica. Basic function of DHT • DHT is a virtual hash table – Input: a key – Output: a data item • Data Items are stored by a network of nodes. • DHT abstraction – Input: a key – Output: the node that stores the key • Applications handle key and data item association. DHT: a visual example K V K V (K1, V1) K V K V K V Insert (K1, V1) DHT: a visual example K V K V (K1, V1) K V K V K V Retrieve K1 Desired properties of DHT • Scalability: each node does not keep much state • Performance: look up latency is small • Load balancing: no node is overloaded with a large amount of state • Dynamic reconfiguration: when nodes join and leave, the amount of state moved from nodes to nodes is small.
    [Show full text]
  • Cloud Token Wallet
    CLOUD TOKEN WALLET SYMBOL CTO STORE, EXCHANGE, EARN & SPEND VERSION 1.0 TABLE OF TABLE 1. EXECUTIVE SUMMARY 01 2. BACKGROUND 02 2.1 What is a blockchain? 02 2.2 What is a cryptocurrency? 04 2.3 What is a cryptocurrency wallet? 05 2.4 What are mobile payments? 06 2.5 What is a cryptocurrency exchange? 07 2.6 What is AI trading? 09 3. PROBLEMS WITH MOBILE CRYPTO WALLETS 10 3.1 Many mobile crypto wallets are centralised 10 CONTENTS 3.2 Mobile crypto wallets only do two things 10 4. ADVANTAGES OF CLOUD TOKEN WALLET 11 4.1 Fully distributed anonymity & transparency 11 4.2 Integrated services & convenience 11 4.2.1 AI-assisted trading system 12 4.2.2 Decentralised exchange 13 4.2.3 Payments 13 5. HOW? PARALLEL LEDGERS! 14 5.1 Parallel consensus 14 5.1.1 Individual P2P POR consensus 14 5.1.2 Organisational hybrid consensus 15 5.2 Parallel dApps for parallel chains 16 6. CLOUD TOKEN WALLET TECHNOLOGY 17 6.1 File System DLT (FSDLT) 17 6.2 Mainline Distributed Hash Table (mDHT) 18 6.3 SHOUT — Simple Heuristic Object UDP Transfer 19 6.4 SWARM Storage 20 6.5 IFTTT Business Logic Layer 21 7. CLOUD TOKEN WALLET SECURITY 22 7.1 Block gap synchronization 22 7.2 Transaction flooding 22 7.3 Penny-spend 23 7.4 51% attack 23 8. ROADMAP 24 8.1 Whence we came 24 8.2 Under construction 25 8.3 The road ahead 25 9. RISKS & CLAIMS 26 10. DOWNLOAD CLOUD TOKEN WALLET 28 EXECUTIVE01 SUMMARY The “Background” chapter of this concept paper offers foundational knowledge.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Peer-To-Peer Systems
    Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Unstructured P2P Overlay Networks – Unstructured Heterogeneous Overlays This slide set is based on the lecture "Communication Networks 2" of Prof. Dr.-Ing. Ralf Steinmetz at TU Darmstadt Unstructured Heterogeneous P2P Overlays Unstructured P2P Structured P2P Centralized P2P Homogeneous P2P Heterogeneous P2P DHT-Based Heterogeneous P2P 1. All features of 1. All features of 1. All features of 1. All features of 1. All features of Peer-to-Peer Peer-to-Peer Peer-to-Peer Peer-to-Peer Peer-to-Peer included included included included included 2. Central entity is 2. Any terminal 2. Any terminal 2. Any terminal 2. Peers are necessary to entity can be entity can be entity can be organized in a provide the removed without removed without removed hierarchical service loss of loss of without loss of manner 3. Central entity is functionality functionality functionality 3. Any terminal some kind of 3. ! no central 3. ! dynamic central 3. ! No central entity can be index/group entities entities entities removed without database 4. Connections in loss of functionality the overlay are Examples: “fixed” Examples: Examples: § Gnutella 0.6 Examples: Examples: § Napster § Gnutella 0.4 § Fasttrack § Chord • AH-Chord § Freenet § eDonkey § CAN • Globase.KOM § Kademlia from R.Schollmeier and J.Eberspächer, TU München HHU – Technology of Social Networks – JProf. Dr. Kalman Graffi – Peer-to-Peer Systems – http://tsn.hhu.de/teaching/lectures/2014ws/p2p.html
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • A Fog Storage Software Architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein
    A Fog storage software architecture for the Internet of Things Bastien Confais, Adrien Lebre, Benoît Parrein To cite this version: Bastien Confais, Adrien Lebre, Benoît Parrein. A Fog storage software architecture for the Internet of Things. Advances in Edge Computing: Massive Parallel Processing and Applications, IOS Press, pp.61-105, 2020, Advances in Parallel Computing, 978-1-64368-062-0. 10.3233/APC200004. hal- 02496105 HAL Id: hal-02496105 https://hal.archives-ouvertes.fr/hal-02496105 Submitted on 2 Mar 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. November 2019 A Fog storage software architecture for the Internet of Things Bastien CONFAIS a Adrien LEBRE b and Benoˆıt PARREIN c;1 a CNRS, LS2N, Polytech Nantes, rue Christian Pauc, Nantes, France b Institut Mines Telecom Atlantique, LS2N/Inria, 4 Rue Alfred Kastler, Nantes, France c Universite´ de Nantes, LS2N, Polytech Nantes, Nantes, France Abstract. The last prevision of the european Think Tank IDATE Digiworld esti- mates to 35 billion of connected devices in 2030 over the world just for the con- sumer market. This deep wave will be accompanied by a deluge of data, applica- tions and services.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • [Hal-00744922, V1] Improving Content Availability in the I2P Anonymous
    Improving Content Availability in the I2P Anonymous File-Sharing Environment Juan Pablo Timpanaro, Isabelle Chrisment*, Olivier Festor INRIA Nancy-Grand Est, France *LORIA - ESIAL, Universit´ede Lorraine Email: fjuanpablo.timpanaro, [email protected] Email: [email protected] Abstract. Anonymous communication has gained more and more inter- est from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anony- mous file-sharing among users. However, one major problem with anony- mous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21648 new torrents were introduced in the BitTor- rent community, whilst only 236 were introduced in the anonymous I2P network, for four different categories of content. Therefore, how can a user of these anonymous networks access this varied and non-anonymous content without compromising its anonymity? In this paper, we improve content availability in an anonymous environment by proposing the first internetwork model allowing anonymous users to access and share content in large public communities while remaining anonymous. We show that our approach can efficiently interconnect I2P users and public BitTorrent swarms without affecting their anonymity nor their performance. Our model is fully implemented and freely usable. 1 Introduction Peer-to-peer file-sharing has always been one of the major sources of the Internet hal-00744922, version 1 - 24 Oct 2012 traffic, since its early beginnings in 2000. It has been moving from semi-central approaches (eDonkey2000, for example), to semi-decentralized approaches (Kazaa, for instance) to fully decentralized file-sharing architectures (like the KAD net- work).
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • TI3800 Bachelorproject
    TI3800 Bachelorproject Android Tor Tribler Tunneling Final Report Authors: Supervisor: Rolf Jagerman Dr. Ir. Johan Pouwelse Laurens Versluis Project coach: Martijn de Vos Ir. Egbert Bouman June 23, 2014 Abstract Tribler is a decentralized peer-to-peer file sharing system. Recently the Tribler development team has introduced anonymous internet communication using a Tor-like protocol in their trial version. The goal of our bachelor project is to port this technology to Android devices. This is a challenging task because cross-compiling the necessary libraries to the ARM CPU architecture is uncharted territory. We have successfully ported all dependencies of Tribler to Android. An application called Android Tor Tribler Tunneling (AT3) has been developed that tests whether these libraries work. This application downloads a test torrent and measures information such as CPU usage and download speed. Based on this information we have concluded that it is currently not viable to run the anonymous tunnels on an Android smartphone. Creating circuits with several hops that use encryption is very computationally expensive and modern smartphones can hardly keep up. By using optimized cryptographic libraries such as gmp or with the recently announced ARMv8 architecture which supports hardware-accelerated AES encryption, creating such circuits might become possible. Preface This document describes the bachelor project we performed at the TU Delft. Without the help of certain people at the TU Delft (and outside), this project would not be possible. In particular, we would like to thank the following people: Johan Pouwelse, for his excellent guidance, deep insights and feedback. The Tribler team, for always being able to help us with problems and questions.
    [Show full text]
  • Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver
    2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover Security Analysis of the Micro Transport Protocol with a Misbehaving Receiver ∗ † ‡ ∗ Florian Adamsky , Syed Ali Khayam , Rudolf Jäger , Muttukrishnan Rajarajan ∗ City University London, United Kingdom Email: {Florian.Adamsky.1, R.Muttukrishnan}@city.ac.uk † National University of Sciences and Technology, Pakistan Email: [email protected] ‡ Technische Hochschule Mittelhessen University of Applied Sciences, Germany Email: [email protected] Abstract—BitTorrent is the most widely used Peer- This approach is inflexible and often leaves big head to-Peer (P2P) protocol and it comprises the largest room which is unused. A better approach is to use share of traffic in Europe. To make BitTorrent more a separate transport protocol for background traffic Internet Service Provider (ISP) friendly, BitTorrent Inc. like TCP-LP [1] or TCP-Nice [2]. These protocols can invented the Micro Transport Protocol (uTP). It is based detect foreground traffic and automatically reduce their on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This sending rate. With uTP using LEDBAT there is a new protocol assumes that the receiver always gives correct kid on the block. feedback, since otherwise this deteriorates throughput or In December 2008, BitTorrent announced in the yields to corrupted data. We show through experimental developer forum that μTorrent will switch the data investigation that a misbehaving uTP receiver, which transfer from TCP to UDP [3]. Shortly after that is not interested in data integrity, can increase the announcement, panic started spreading all over the bandwidth of the sender by up to five times.
    [Show full text]