Title: Message Splitting Against the Partial Adversary
1Message Splitting Against the Partial Adversary
- Andrei Serjantov
- The Free Haven Project (UK)
- Steven J Murdoch
- University of Cambridge Computer Laboratory
2Outline
- Mix Systems. Criticisms.
- too strong threat model(!)
- intersection attack when 1 msg (too much data)
sent - Weaker threat model
- Sending each message via random route
- non connection-based system
- Empirical observations about Mixmaster Mixminion
- Characteristic delay function Dan04 is
difficult to esitmate
3Mix Systems
- Well known to this audience
- Implemented
- Mixmaster
- Mixminion
- Threat Model
- Global Passive Adversary (GPA)
- GPA with some (all but one?) compromised mixes
4Criticisms
- GPA does not exist
- (a matter of some debate)
- The mix system (Chaum 81) allows one fixed-sized
message to be sent anonymously - Great for votes
- Ok for email
- Bad for Web Browsing
- Awful for Bit Torrent
- If 1 message (more than 32K data), anonymity is
degraded
5Intersection Attack
Receivers
Senders
Attacker
6Traffic
7Intersection Attack
- BPS00 On the Disadvantages of Free Mix Routes
(PET2001) - WALS02 An Analysis of the Degradation of
Anonymous Protocols (NDSS02) - KAP02 Limits of Anonymity in Open Environments
(IH2002) - Dan03 Statistical Disclosure (I-NetSec03)
- DS04 (IH2004)
- Dan04 The traffic analysis of continuous-time
mixes (PET2004) - etc
8The Common Wisdom
- Intersection attacks are
- Realistic
- Powerful (reduce anonymity quickly)
- Hard to protect against
- Require lots of dummy traffic
9A Weaker Model
1
1
1
A
D
Mix 1
2
Mix 2
2
2
E
B
Mix 3
Mix 4
F
C
10A Better Threat Model
- A Partial Adversary
- Does not observe all Sender to Mix links
- (alternatively not all mixes which senders can
send to) - Ignore compromised mixes
11Observed Mix
Attacker sends all his messages via one single
route theough the mix system
1
1
1
A
D
Mix 1
Mix 2
2
2
2
B
E
Mix 3
Mix 4
12Splitting Data
Sender B splits his stream of data and sends each
message via a randomly chosen route
1
1
1
A
E
Mix 1
Mix 2
2
1
1
2
Mix 3
Mix 4
1
B
F
1
The problem how do you choose the first mix?
C
13The Details
- Problem
- mixes to send to
- compromised, the rest not (but no idea which
ones) - P packets
- What are the s.t. a random subset (attacker)
- of size gives least information about
- Note that (dummy traffic)
- No proof or optimal solution in this paper!
- See one possible solution next
14One possible scheme
- Pick (uniformly) at random a sequence of mixes
- Pick from a geometric distribution with mean .
Set - Pick from a geometric distribution with mean
. Set - etc
- Another in the paper (with some analysis)
15Part II
- (Looking at a particular intersection attack and
finding it not as easy as it looks at first
glance)
16Another Intersection Attack
- Danezis 2004 (thanks for the diagrams)
17The Details
18The Characteristic Delay Function
- What is this for
- Mixes
- Mixmaster
- Mixminion
- Tor
- This maybe unfair Danezis intended his attack
for lwo latency systems (Tor) - Nevertheless interesting
19The Characteristic Delay Function
- Theory
- What is the delay of a mix (cascade/network)
- Can say not very much about it (as usual)
- Details in the paper
- Practice
- Steven wrote a disciplined pinger
- Does not ping too often, hope not to affect the
results by sampling
20Results
21Results
22Comparing
- Nothing surprising
- Mixmaster has longer delay
- Heavy tails
23Conclusions I
- It is well known that the intersection attack is
powerful - No reason to abandon investigation!
- New interesting, mathematically well defined
threat model - Splitting traffic amongst first nodes
- Does not have the efficiency of Tor or other
connection-based systems - Does gain anonymity advantage (but only by means
of a weaker threat model)
24Conclusions II
- Characteristic function of Mixmaster, Mixminion
difficult to work out in theory or estimate
empirically - Data at
- All references at Anonymity Bibliography
- Thank you
25The Anonymity Advantage
100
The Network (Mixmaster)
17
Alice
10
87
5
Total observed packets
100
The Network (Mixmaster)
170
10
87
Alice
5
26Intersection Attack
Receivers
Senders
Mixes
27A Weaker Model
28Observed Mix
Attacker sends all his messages via one single
route theough the mix system
29Splitting Data
Attacker splits his stream of data and sends each
message via a randomly chosen route
The problem how do you choose The first mix?
30Results
31Results
32Comparing
- Nothing surprising
- Mixmaster has longer delay
- Heavy tails