Chair for Network Architectures and Services Technische Universitat¨ Munchen¨

Anonymization in the Internet

Adrian Struzek

Chair for Network Architectures and Services Department for Computer Science Technische Universitat¨ Munchen¨

April 10, 2015

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 1 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Outline

Introduction

Relaying of Remailers and Proxies

Bitmessage

Freenet P2P Networks

Conclusion

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 2 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Introduction

Goals:

I Overview of different concepts for anonymization

I Introduction to three different services

I Understanding of the Pros and Cons of each service

The three presented services are:

I Tor - Relaying of Messages

I Bitmessage - Covertraffic

I Freenet - Peer-to-Peer networks

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 3 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Conceptions

I Messages: When referring to messages, we mean all data that is sent to another node

I Meta-data: ”Data about Data”, in our case mostly concerning descriptive meta-data; Describes contents and context of actual message-data, date of sending, location of sender/recipient etc.

I Attacks: - Correlation: linking messages at different locations in network by time, size and other meta-data - Traffic analysis: searching traffic for key-words, generating user- and network-profiles - Compromised Nodes: Nodes under (partial-)control by an adversary. Leaking Information to unwelcome third parties

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 4 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Relaying of Messages

Adversaries can infer a lot of information from IP- and UDP-headers Other protocol-headers may contain even more information, sometimes not even needed by the protocol Example: Non encrypted SMTP-Headers contain sender, recipient, subject, date of sending and other information Remailers and Proxies allow to change some of that information by relaying your data through their service

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 5 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Remailers and Proxies

Remailers and Proxies alike, strip incoming messages of sender information and replace it with their own There are different kind of services, with different functionality and anonymity Some services have cascaded server chains, to hinder correlation attacks There are various weaknesses, but most important is the fact that service providers themselves may be compromised or malicious. It’s advisable to always use end-to-end

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 6 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Overview

What is Tor? Network Design Circuits Hidden Services Weaknesses

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 7 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor

Tor is used to anonymize TCP-based applications, e.g. Browsers, Instant Messengers Is realized by an distributed overlay network consisting of relay nodes and clients data is wrapped in several layers of encryption, hence the name specifies route the data takes through the network, a so called circuit

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 8 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Network Design

Symmetric Encryption Key

Encryption Layer

Onion Routers Exit Node Entry Node

Onion Proxy Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 9 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Network Design

clients share a encryption key with each hop Data is wrapped in several encryption layers, each layer containing the address of a hop When receiving data, an OR decrypts it, hence revealing the address of the next hop ORs know only their predecessor and their successor on the path

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 10 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Circuits

The path the data from a client takes through the network is called a circuit TCP streams from multiple applications are multiplexed through one circuit New circuits are established periodically, old ones with no open TCP-streams expire to establish a circuit, a client negotiates symmetric encryption keys with the hops, one at a time

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 11 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Hidden Services

Tor can also be used to provide anonymous services, e.g. web sites Servers are configured to accept connections only from Tor, making it a requirement to access them Hidden services are accessed by an onion address, a pseudo-to-level-domain host suffix Since they are part of the Tor-network, connection can be considered end-to-end encrypted provide high degree of anonymity for service providers and consumers alike

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 12 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Tor - Weaknesses

By Design, Tor gives no protection from monitoring at network borders If exit nodes are malicious, outgoing traffic could be monitored and searched for sensitive information, e.g. login credentials to websites Insecure TCP-based applications like BitTorrent can be exploited by adversaries to get the user’s IP-address. Uses of other applications can then be associated to the user Since exit-nodes are publicly known, they can be blocked by servers.

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 13 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Bitmessage

Bitmessage is a peer-to-peer protocol for sending messages to other users Messages are encrypted using public-private-key encryption Users are addresses by Bitmessage addresses Public key is retrieved first, then the message is encrypted and sent

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 14 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Bitmessage - Forwarding of Messages

1 1

Alice

2 1 2

2 2 3

Bob Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 15 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Bitmessage

Message are forwarded to all users Contain no information about sender or recipient Only the intended recipient can decrypt the message Additionally, users can subscribe to other users and receive their published messages in a newsletter-like manner

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 16 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Bitmessage

When a node receives a message he cannot decrypt, the message is first mixed with all other messages of the node and then forwarded This way, when a message is sent it is hard to discern from forwarded messages Sent messages are stored on the forwarding nodes only for two days. If the recipient is not online during that time, the message is lost and has to be re-sent.

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 17 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ P2P Networks

Decentralized and self-organizing Users connect directly to one another, no servers involved Data-redundancy facilitates a high degree of censorship resistance DDoS attacks on P2P Networks are

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 18 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet

P2P-service with the goal to guarantee freedom of speech, with a high degree of anonymity Provides separate networks, not accessible without the service Each client provides storage space to the network Files are often split in parts and stored independently on different nodes Data is also stored redundantly on various nodes, depending on it’s popularity Permanent storage is not guaranteed. If a file is not requested often, it will be deleted if storage space is sparse

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 19 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet - GUIDs

All files have globally unique identifiers (GUIDs), used for file-storage operations Two main types of GUIDs : Content-Hash-Keys (CHKs) and Signed-Subspace-Keys (SSKs) CHKs are used for primary data storage or retrieval and generated by hashing a files contents SSKs set up a personal space, that anyone can read but only the owner can write to. This can be used to authenticate a pseudonymous author while protecting his anonymity

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 20 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet - CHKs

CHK ADD

FILE

CHK @ file hash , decryption key , crypto settings CHK @ SVbD9~HM5nzf3AX4yFCBc- ,bA7qLNJR7IXRKn6uS5PAySjIM6azPFvK~18kSi6bbNQ , AAEA--8 A4dhNUF5DPJZLL5NX5Brs

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 21 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet - SSKs

SIGNED SUBSPACE

CHK

EDIT FILE CHK

CHK FILE

CHK ADD FILE READ

FILE

CHK REMOVE CHK FILE FILE

SSK @ public key hash , decryption key , crypto settings / user selected name-version SSK @ GB3wuHmt[..]o-eHK35w , c63EzO7u[..]3YDduXDs , AQABAAE / mysite-4

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 22 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet

Freenet can be used as a dark net, meaning the client will only connect to trusted peers, which have been added as friends manually Using Freenet in dark net mode combined with hard drive encryption, provides the highest degree of anonymity and security of all presented services Of course, availability of services and information is reduced that way In open-net mode, clients potentially connect to all other users in the network and reveal their IP-address to some peers when connecting to them

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 23 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Freenet - Weaknesses

Harvesting : An adversary can launch some nodes in the network and start collecting Ip-addresses of peers. Authorities can potentially block at least some content this way Advanced traffic analysis : Requests to the network are not mixed in any way. An Observer with global monitoring capabilities can perform traffic analysis due to this.

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 24 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Conclusion - Tor

Tor :

I + Good choice for common user concerned about privacy

I + Can browse and use normal web services like public websites

I + Can use TCP-based applications through it

I + Anonymous publishing with Hidden services

I - Sensitive information like passwords should only be transmitted with end-to-end encryption

I - insecure applications that share the clients IP-address should not be used through it

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 25 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Conclusion - Bitmessage

Bitmessage :

I + Good choice for private messaging

I + can be used as substitute to email with known peers and friends

I + can be combined with Tor

I + Newsletter functionality

I - Weaknesses and potential threats are mostly unknown

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 26 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨ Conclusion - Freenet

Freenet :

I + Darknet functionality : Highest anonymity possible

I + Authenticated yet anonymous publishing

I + High censorship resilience

I - no protection from global observer

I - prone to harvesting of IP-addresses

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 27 Chair for Network Architectures and Services Technische Universitat¨ Munchen¨

Thank you for your attention!

Technische Universitat¨ Munchen¨ – Chair for Network Architectures and Services 28