Athicc: an Anonymous, Asynchronous, Serverless Instant Messaging Protocol

Athicc: an Anonymous, Asynchronous, Serverless Instant Messaging Protocol

Proceedings of the 52nd Hawaii International Conference on System Sciences | 2019 ATHiCC: An Anonymous, Asynchronous, Serverless Instant Messaging Protocol Daniel F. Balchasan Michal Ozaniak Yoav Schwartz Nicolai S. Steffensen Aalborg University Aalborg University Aalborg University Aalborg University [email protected] [email protected] [email protected] [email protected] Samant Khajuria Lene T. Sørensen Aalborg University Aalborg University [email protected] [email protected] Abstract encryption by default can, and do, collect ‘metadata’. This metadata includes, but is not limited to, the Instant messaging has become a main form of sender, receiver, and location of the message. communication between people. The ability to Therefore, even though the content of the message is instantly send messages to each other, even when the secure, enough information can be deduced with the recipient is offline, has become second nature and is metadata to undermine the user’s privacy. taken for granted in modern society. However, this is Chat software that do put encryption and privacy not without a cost. In the case of instant messaging, at the top of their priority, like Telegram, get attacked that cost is privacy. Service providers use centralized by governments [7], and users are getting blocked servers to store these messages and can collect from the service. This is relatively easy to achieve information using the messages ‘Metadata’ or even through the ISPs [8], since they can be forced to block read the contents of messages. This paper presents a access to the servers that host the chat service. novel protocol, ATHiCC (Asynchronous Tor Hidden These points have led the authors to conclude that Chat Communication) [1] that allows private and there is a need for a fully distributed, autonomous anonymous communication that doesn't require a instant messaging software that would be secure, server, and yet is still able to support asynchronous private and anonymous, so that no user data can be communication. A simulator was implemented to test collected. the protocol and performance under various network There are applications [9][10] that do provide these conditions and topologies. The results of the requirements, however they are not widely used as simulation predict high delivery rates and low delays they are less usable than their popular counterparts and in message delivery under most conditions, even in users often choose what they deem is secure enough small network topologies. over a more secure option that is less usable [11]. One of the main features missing from these programs, is one we take for granted in modern 1. Introduction communication systems, namely, the ability to send messages in an asynchronous manner when the Privacy is a fundamental human right, as recipient is offline. This is because they rely on Peer- recognized by the UN Declaration of Human Rights to-Peer communication between clients which makes [2] and yet, recent events make it clear that internet it challenging to support asynchronous features. users right to privacy is being violated. Governments The goal of this paper is to suggest a protocol that are collecting more information than ever [3] and supports asynchronous messaging while being private, some of the biggest companies in the world use users’ secure and fully distributed. This work is done by personal data as a financial model e.g. Facebook and designing a protocol that uses other users in the Google. network, in a unique fashion, while relying on the Facebook, the biggest social network in the world, characteristics of Tor onion services to deliver which was involved in a scandal leaking millions of asynchronous messages. The protocol is then tested users’ details [4], has one the most popular instant using a simulation software developed to test the messaging applications on the market [5]. In protocol’s performance under varying conditions. “Messenger”, Facebook’s instant messaging The outline of this paper is as follows; in Section application [6], conversations are not end-to-end 2, an overview of related work is presented. In Section encrypted by default, meaning Facebook can read the 3 the conceptual framework around the protocol is laid majority of messages sent. out. Section 4 and Section 5 give the background and Even chat services that do implement end-to-end URI: https://hdl.handle.net/10125/59942 ISBN: 978-0-9981331-2-6 Page 5049 (CC BY-NC-ND 4.0) details of the protocol. Section 6. contains the 2.3. Tox methodology for the simulation, and in Section 7 the results of the simulation are presented. Finally, Section Tox [9] is an encrypted instant messaging protocol, 8 and Section 9 discuss the considerations made in the which provides peer-to-peer communication. It works design process and possible future work. by creating a network of users, who via an anonymous identifier connect and send messages to each other. 2. Related Work The protocol employs perfect forward secrecy, just like Signal does. Much work has been put into developing solutions Tox doesn’t natively support asynchronous for secure and private end-to-end encrypted messages, it only implements a ‘pseudo-offline’ communication. Many of these approaches either offer message [19], where a message is stored locally at the high levels of security and anonymity, but with a low user, until both are online. Third-party developers number of features with respect to messaging. Others have tried to solve this issue of Asynchronous offer many features, but lower levels of security and messaging in two different ways: Relay through anonymity. another user and relay through a decentralized server, called ‘supernodes’. None of the presented solutions combine both high 2.1. Ricochet levels of security and the possibility to send asynchronous messages and to the best of the authors Ricochet [10] is an example of a chat application knowledge, no other current solution on the market which offers high-level security and anonymity by offer this. In this paper, such a solution will be utilizing Tor [12] and Tor Onion Services [13]. It presented. utilizes end-to-end encryption and guarantees that only the sender and receiver can read the content. 3. Conceptual Framework By utilizing Tor Onion Services, it also eliminates any possibility that an entity can gather metadata or track who send which message. Furthermore, the In this section we will present some of the concepts application works autonomously without the need of and terms needed in order to understand the design and any kind of servers for routing or connecting peers, functionality of the solution presented in this paper. since this is done by the Tor network. This means no one can track who is using the application, as all Tor 3.1. Tor traffic is indistinguishable [14]. This level of security and anonymity does come with a downside as One of the main requirements set for the protocol Ricochet only works when both parties are online at is anonymity. In the context of this paper, maintaining the same time. anonymity means not disclosing any information which may indicate the identity of the user or their 2.2. Signal location, namely the IP address of the device. It was decided that the IP address would be kept private by designing the protocol over an Onion Signal is a chat protocol, developed by Open Routing network [18]. Whispers Systems in 2013 [15] and implemented into Onion Routing [20] provides anonymous routing a number of different chat applications like, Signal of data over the internet, by encapsulating data packets [16], WhatsApp [17], secret conversations in (including the IP layer headers) in encryption layers Facebook Messenger and Google Allo in incognito like an onion (hence the name). These packets are then mode [18]. It offers a high level of security by enabling sent through multiple proxies (Onion Routers), each end-to-end encryption, with a different key for each removing a layer of encryption until the clear-text message. Providing perfect forward secrecy, so that if packet is sent by the last proxy to the destination. one key is lost, no other messages can be decrypted. The Onion Routing network selected for the In Signal all messages are sent to a server, making protocol is Tor [12], due to the scale and performance. it possible to send messages to users who are offline. In order to open secure connections over the Tor This doesn’t allow the server to see the content of the network, first a list of onion routers must be retrieved messages, but all metadata can be collected. Signal is from a distributed hash table. Using this list, three therefore considered as a secure, but not a private chat random onion routers are picked which will function protocol. as proxies. Shared keys are then negotiated via TLS/SSLv3 with each of the onion routers and a path (tunnel) in the network is created. Page 5050 When using Tor onion routing, even though the 3.3. Centralized/decentralized/distributed base packets are sent over TCP/IP, they cannot be traced back to their source, even by the receiver of the Centralized Systems are systems which rely on a packet. However, as the packets leave the last leg of single entity for decision making, such as a server. the path unencrypted, the payloads of said packets are This means that one entity (or a group of entities acting not kept secure. as one) provides a critical service for the function of the system. 3.2. Tor Onion Services Onion services [13] is a feature of the Tor network. Previously known as ‘Hidden Service’, Onion Services allow devices to provide services over the Tor network, without revealing their IP addresses, and thus their location.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us