The Anonymous Post-Office Protocol

The Anonymous Post-Office Protocol

Proceedings on Privacy Enhancing Technologies 2016; 2016 (2):1–20 Nethanel Gelernter, Amir Herzberg, and Hemi Leibowitz Two Cents for Strong Anonymity: The Anonymous Post-office Protocol Abstract: We introduce the Anonymous Post-office Pro- tency; to achieve this, Tor design prefers reducing la- tocol (AnonPoP), a practical strongly-anonymous mes- tency to improving anonymity, and is vulnerable to glob- saging system. AnonPoP design combines effectively ally eavesdropping adversaries. Several works show that known techniques such as (synchronous) mix-cascade Tor is vulnerable even to weaker attackers, e.g., off-path and constant sending rate, with several new tech- attackers [28] and malicious servers/clients [3] [10]. niques including request-pool, bad-server isolation and The popularity of Tor indicates that it provides per-epoch mailboxes. AnonPoP offers strong anonymity valuable service to many users and scenarios, despite its against strong, globally eavesdropping adversaries, that limited guarantees for anonymity (and its non-negligible may also control multiple AnonPoP’s servers, even all- overhead). However, there are also many scenarios and but-one servers in a mix-cascade. Significantly, Anon- users that require stronger anonymity properties, even PoP’s anonymity holds even when clients may occa- at the cost of somewhat higher latency and overhead. sionally disconnect; this is essential to support mobile Several works proposed protocols for stronger clients. anonymity guarantees, as compared to Tor. However, AnonPoP is affordable, with monthly costs of 2¢ per existing research on strong anonymity is mostly imprac- client, and efficient with respect to latency, communi- tical. Indeed, many seem to believe that it is infeasible cation, and energy, making it suitable for mobile clients. to ensure strong anonymity properties in a practical sys- We developed an API that allows other applications tem for many users, with acceptable overhead and effi- to use AnonPoP for adding strong anonymity. We vali- ciency. We show that it is feasible to have practical, ef- dated AnonPoP’s functionality, reliability, efficiency and ficient system providing strong anonymity at low costs, usability by experiments using web-based and mobile supporting large number of users. applications used in ‘double-blinded’ usability study, Another limitation of Tor is that it provides a com- cloud-based deployment and simulations. munication channel, but not a complete messaging sys- tem. A complete messaging system should also provide Keywords: Anonymity, Mixnets, Privacy, Annonymous ‘mailbox’ facilities to keep messages until users pick communication, Tor them up; this is also required to prevent detection of DOI Editor to enter DOI a pair of users which frequently communicate with each Received ..; revised ..; accepted ... other and may get disconnected. A naive mailbox solu- tion, where Tor is used to communicate with a mailbox server, would allow the server to de-anonymize users by 1 Introduction exploiting Tor’s weaknesses, e.g., eavesdropping on par- ticular (suspect) user, and correlating between messages There have been many efforts to develop, analyze, de- sent/received by this user, and messages received to this ploy and use anonymous communication protocols and mailbox or sent from this mailbox. systems. In particular, the Tor anonymous network [23] In summary, there is large interest in anonymity, is widely used. However, Tor focuses on minimizing la- and Tor offers some level of anonymous communication; however, neither Tor nor any other practical (existing or proposed) system allows strongly-anonymous messag- ing. This is disappointing; strong anonymity messag- Nethanel Gelernter: Dept. of Computer Science, ing is both necessary and feasible. Messaging is used College of Management Academic Studies, E-mail: more and more for business and personal communica- [email protected] tion, and anonymity is often required - for reasons rang- Amir Herzberg: Dept. of Computer Science, Bar Ilan Uni- ing from whistle-blowing to consulting on sexual harass- versity, E-mail: [email protected] Hemi Leibowitz: Dept. of Computer Science, Bar Ilan Uni- ment. And, as we show, strongly-anonymous messaging versity, E-mail: [email protected] is feasible, since the volume of (text) messages is not Two Cents for Strong Anonymity: The Anonymous Post-office Protocol 2 very large, and reasonable delays are acceptable. Hence, ery other proposed protocols for anonymous messaging, it is frustrating that such system is not yet operative. with acceptable overhead and extremely low yearly cost In this paper, we present the Anonymous Post-office (< 0.25$ per client). Furthermore, AnonPoP is the first Protocol (AnonPoP), a practical anonymous messag- protocol that was designed and shown to be suitable ing system, designed to ensure strong anonymity, even also for mobile devices. against strong attackers. We present the design, its ra- Beyond that, this paper makes the following contri- tionale and its anonymity properties, and discuss prac- butions: tical deployment aspects, including: - The request-pool technique, allowing ‘masking’ of pe- 1. Implementation and evaluation in real world envi- riods when a client is disconnected. ronment. - Per-epoch mailboxes, limiting the exposure due to 2. Operating costs in cloud environment. client disconnections and due to active tagging attacks. 3. Adjustment to mobile devices, with an emphasis on - The bad-server isolation mechanism, allowing isolation user experience and energy consumption. of corrupt server (mix or PO), involved in aggressive (non-stealthy) tagging attacks. Other techniques, times- Anonymity loves company [22]: hence, the goal of Anon- tamps and de-duplication, are used to prevent and/or PoP is to provide strong anonymity with superb func- detect tagging attacks. tionality, usability, reliability, efficiency and low-cost, as - We fine-tune AnonPoP to allow its use in mobile de- necessary to attract many users, and with the scala- vices, including energy-savings considerations. We con- bility required to support millions of users. In partic- ducted double-blinded user-sensitivity experiment to ular, AnonPoP uses efficient cryptographic primitives validate acceptable energy use. and has acceptable energy consumption, making it ap- - An open-source prototype of AnonPoP, including API propriate for use on mobile devices. Furthermore, Anon- for applications, and an Android messaging application PoP is the only proposed anonymous messaging proto- that uses this API. col to support client disconnections, a feature which is essential to support mobile clients. To measure and confirm AnonPoP’s low operating costs, Paper Layout and Organization we implemented and installed AnonPoP’s servers in In section 2, we start with an overview of AnonPoP the cloud, and tested it on hundreds of thousands of architecture and main building blocks. We then define clients, communicating anonymously with each other and explain the adversary model and all anonymity no- using AnonPoP. We found that the cost of supporting tions and properties achieved by AnonPoP in section such a large amount of clients is less than a quarter per 3. Sections 4-6 will explain how AnonPoP design and user, per year, or two cents per month. mechanisms handle attacks against wide range of at- We provide an API for messaging applications to tackers with different resources and capabilities. Section easily add an option for strong anonymity using Anon- 7 will detail a ‘double-blinded’ usability study, show- PoP. With this API, clients of different applications can ing that AnonPoP is suitable for mobile devices. Sec- form one large anonymity set. For example, we used the tion 8 will present a cloud based evaluations conducted API to rapidly develop an anonymous Eliza [49] client, under‘real-world’ conditions, demonstrating the feasibil- demonstrating the use of anonymous messaging for sen- ity of AnonPoP and discussing operating costs, and the sitive consulting services. AnonPoP API. We conclude by surveying related work Readers are encouraged to try out AnonPoP using in comparison to AnonPoP in section 9. a mobile application, web-interface and the API [1], to experience the efficiency, acceptable overhead and us- ability. 2 Architecture and Concepts Contributions The goal of AnonPoP is to support anonymous exchange Our main contribution is the design, development and of messages between clients; messages are packed at the evaluation of strongly-anonymous messaging protocol, clients into fixed-size envelopes, and sent via AnonPoP’s secure against strong adversaries, and showing that servers. AnonPoP uses two types of servers: Post-Office it is practical even for mobile clients. We show that (PO) servers and timed mixes (see Figure 1). The PO AnonPoP ensures better anonymity properties than ev- Two Cents for Strong Anonymity: The Anonymous Post-office Protocol 3 The PO maintains anonymous mailboxes containing envelopes sent to different clients. Envelopes received by the PO are still encrypted; hence, a corrupt, eaves- dropping PO cannot identify the recipients, senders or contents, provided that the mixes are honest, and Fig. 1. System architecture of AnonPoP (Anonymous Post-office users are always connected. (AnonPoP has defenses for Protocol). The Post-Office (PO) maintains anonymous mailboxes; anonymity when users may disconnect, as we describe clients push and pull envelopes to/from the mailbox anonymously in next section.) via mix-cascades. All communication channels (represented

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us