Anon V Panopticon PDF
Anon V Panopticon PDF
UNPUBLISHED DRAFT
1. INTRODUCTION through software exploits or user error, an attacker can often cir-
In today’s “Big Data” Internet, users often need to assume that, cumvent anonymity tools entirely [24].
arXiv:1312.5307v3 [cs.CR] 3 Jan 2015
by default, their every statement or action online is monitored and Current approaches to anonymity also appear unable to offer ac-
tracked. Users’ statements and actions are routinely linked with curate, principled measurement of the level or quality of anonym-
detailed profiles built by entities ranging from commercial vendors ity a user might obtain. Considerable theoretical work analyzes
and advertisers to state surveillance agencies to online stalkers and onion routing [10], but relies on idealized formal models making
criminal organizations. Indeed, recent events have raised the stakes assumptions that are unenforceable and may be untrue in real sys-
in Internet monitoring enormously. Documents leaked by Edward tems – such as that users choose relays and communication partners
Snowden have revealed that the US government is conducting war- at random – or depending on parameters that are unknown in prac-
rantless surveillance on a massive scale and, in particular, that the tice, such as probability distributions representing user behavior.
long-term goal of the National Security Agency is to be “able to We believe the vulnerabilities and measurability limitations of
collect virtually everything available in the digital world” [18]. onion routing may stem from an attempt to achieve an impossi-
Internet users often have legitimate need to be anonymous – i.e., ble set of goals and to defend an ultimately indefensible position.
“not named or identified” by Webster’s definition of the term – to Current tools offer a general-purpose, unconstrained, and individ-
protect their online speech and activities from being linked to their ualistic form of anonymous Internet access. However, there are
real-world identities. Although the study of anonymous-communi- many ways for unconstrained, individualistic uses of the Internet to
cation technology is often motivated by high-stakes use cases such be fingerprinted and tied to individual users. We suspect that the
as battlefield communication, espionage, or political protest against only way to achieve measurable and provable levels of anonymity,
authoritarian regimes, anonymity actually plays many well accepted and to stake out a position defensible in the long term, is to develop
roles in established democratic societies. For example, paying cash, more collective anonymity protocols and tools. It may be necessary
voting, opinion polling, browsing printed material in a book store or to constrain the normally individualistic behaviors of participating
library, and displaying creativity and low-risk experimentalism in nodes, the expectations of users, and possibly the set of applications
forums such as slashdot or 4chan are everyday examples of anony- and usage models to which these protocols and tools apply.
mous activity. Author JK Rowling used a pen name on a recent Toward this end, we offer a high-level view of the Dissent project,
post-Harry Potter novel, presumably not out of any fear of censor- a “clean-slate” effort to build practical anonymity systems embody-
ship or reprisal, but merely “to publish without hype or expectation ing a collective model for anonymous communication. Dissent’s
and . . . to get feedback under a different name” [22]. collective approach to anonymity is not and may never be a “drop-
Obtaining and maintaining anonymity on the Internet is chal- in” functional replacement for Tor or the individualistic, point-to-
lenging, however. The state of the art in deployed tools, such as point onion routing model it implements. Instead, Dissent sets out
Tor [1], uses onion routing (OR) to relay encrypted connections on to explore radically different territory in the anonymous-commu-
a detour passing through randomly chosen relays scattered around nication design space, an approach that presents advantages, disad-
the Internet. OR is scalable, supports general-purpose point-to- vantages, and many as-yet-unanswered questions. An advantage is
point communication, and appears to be effective against many of that the collective approach makes it easier to design protocols that
the attacks currently known to be in use [12]. Unfortunately, OR is provably guarantee certain well defined anonymity metrics under
known to be vulnerable to several classes of attacks for which no arguably realistic environmental assumptions. A disadvantage is
solution is known or believed to be forthcoming soon. For exam- that the collective approach is most readily applicable to multicast-
ple, via traffic confirmation, an attacker who compromises a major oriented communication, and currently much less efficient or scal-
ISP or Internet exchange might in principle de-anonymize many able than OR for point-to-point communication.
Tor users in a matter of days [14]. Through intersection attacks, Dissent follows in the tradition of Herbivore [20], the first at-
an adversary can rapidly narrow the anonymity of a target via ac- tempt to build provable anonymity guarantees into a practical sys-
tions linkable across time, in much the same way Paula Broadwell tem, and to employ dining cryptographers or DC-nets [5]. Dissent
and the “High Country Bandits” were de-anonymized [19]. Finally, utilizes both DC-nets and verifiable shuffles [17], showing for the
first time how to scale the formal guarantees embodied in these
This material is based upon work supported by the Defense Ad- techniques to offer measurable anonymity sets on the order of thou-
vanced Research Projects Agency (DARPA) and SPAWAR Sys- sands of participants [23]. Dissent’s methods of scaling individual
tems Center Pacific, Contract No. N66001-11-C-4018.
Permission to make digital or hard copies of all or part of this work for anonymity sets are complementary and synergistic with techniques
personal or classroom use is granted without fee provided that copies are Herbivore pioneered for managing and subdividing large peer-to-
not made or distributed for profit or commercial advantage and that copies peer anonymity networks; combining these approaches could en-
bear this notice and the full citation on the first page. To copy otherwise, to able further scalability improvements in the future.
republish, to post on servers or to redistribute to lists, requires prior specific Dissent incorporates the first systematic countermeasures to ma-
permission and/or a fee.
Copyright 2008 ACM 0001-0782/08/0X00 ...$5.00.
jor classes of known attacks, such as global traffic analysis and
intersection attacks [16, 25]. Because anonymity protocols alone
cannot address risks such as software exploits or accidental self-
identification, the Dissent project also includes Nymix, a proto-
type operating system that hardens the user’s computing platform
against such attacks [24]. Dissent and Nymix OS can of course
offer only network-level anonymity, in which the act of commu-
nicating does not reveal which user sent which message. No ano-
nymity system can offer users personal anonymity if, for example,
they disclose their real-world identities in their message content.
Figure 1: Onion routing (OR).
While at this time Dissent is still a research prototype not yet
ready for widespread deployment, and may never be a direct re-
placement for OR tools such as Tor because of possibly fundamen- communications around a distributed network of relays run by vol-
tal tradeoffs, we hope that it will increase the diversity of practical unteers all around the world; it prevents somebody watching your
approaches and tools available for obtaining anonymity online. Internet connection from learning what sites you visit, and it pre-
Section 2 presents the basics of OR and Tor. In Section 3, we vents the sites you visit from learning your [network] location.”
describe four problems with OR that have gone unsolved for many The project provides free application software that can be used for
years and may unfortunately be unsolvable. Section 4 provides an web browsing, email, instant messaging, Internet relay chat, file
overview of the Dissent approach to anonymous communication, transfer, and other common Internet activities; users can also ob-
and Section 5 contains open problems and future directions. tain free downloads that integrate the underlying Tor protocol with
established browsers, email clients, etc. Importantly, Tor users can
2. ONION ROUTING AND TOR easily (but are not required to) transform their Tor installations into
Tor relays, thus contributing to the overall capacity of the Tor net-
Currently the most widely deployed, general-purpose system for
work. Currently, there are approximately 40M “mean daily users”
anonymous Internet communication is Tor [1]. Tor’s technical foun-
of Tor worldwide, slightly over 10% of whom are in the United
dation is onion routing [13], derived in turn from mixnets [7].
States, and approximately 4700 relays. These and other statistics
Onion routing (OR) uses successive layers of encryption to route
are regularly updated on the Tor Metrics Portal [2].
messages through an overlay network, such that each node knows
The IP addresses of Tor relays are listed in a public directory so
the previous and the next node in the route but nothing else. More
that Tor clients can find them when building circuits. (Tor refers
precisely, let (V, E) be a connected, undirected network and R ⊆
to routes as “circuits,” presumably because Tor is typically used
V be a set of nodes serving as relays. The set R is known to all
for web browsing and other TCP-based applications in which traf-
nodes in V , as is the public key Kr , usable in some globally agreed-
fic flows in both directions between the endpoints.) Clearly, this
upon public-key cryptosystem, for each node r ∈ R. There is a
makes it possible for a network operator to prevent its users from
routing protocol that any node in V can use to send a message to
accessing Tor. The operator can simply disconnect the first hop in
any other node, but the nodes need not know the topology (V, E).
a circuit, i.e., the connection between the client and the first Tor
If node s wishes to send message M to node d anonymously,
relay, because the former is inside the network and the latter is out-
s first chooses a sequence (r1 , r2 , . . . , rn ) of relays. It then con-
side; this forces the Tor traffic to flow through a network gateway,
structs an “onion” whose n layers contain both the message and the
at which the operator can block it. Several countries that operate
routing information needed to deliver it without revealing node s’s
national networks, including China and Iran, have blocked Tor in
identity to any node except the first relay r1 . The core of the onion
precisely this way. Similarly, website operators can block Tor users
is (d, M ), i.e., the destination node and the message itself. The nth
simply by refusing connections from the last relay in a Tor circuit;
or innermost layer of the onion is
Craigslist is an example of a US-based website that does so. As a
On = (rn , ENCKrn (d, M )), partial solution, the Tor project supports bridges, or relays whose
IP addresses are not listed in the public directory, of which there are
i.e., the nth relay node and the encryption of the core under the nth currently approximately 2000. Tor bridges are just one of several
relay’s public key. More generally, the ith layer Oi , 1 ≤ i ≤ k − 1, anti-blocking or censorship-circumvention technologies.
is formed by encrypting the (i + 1)st layer under the public key of There is inherent tension in OR between low latency, one as-
the ith relay and then prepending the ith relay’s identity ri : pect of which is short routes (or, equivalently, low values of k),
Oi = (ri , ENCKri (Oi+1 )). and strong anonymity. Because its goal is to be a low-latency
anonymous-communication mechanism, usable in interactive, real-
Once it has finished constructing the outermost layer time applications, Tor uses 3-layer onions, i.e., sets k = 3 as in
O1 = (r1 , ENCKr1 (O2 )), Figure 1. Despite this choice of small k, many potential users re-
ject Tor because of its performance impact [8].
node s sends ENCKr1 (O2 ) to r1 , using the routing protocol of
the underlay network (V, E). When relay ri , 1 ≤ i ≤ n, re-
ceives ENCKri (Oi+1 ), it decrypts it using the private key kri 3. ATTACKS ON ONION ROUTING
corresponding to Kri , thus obtaining both the identity of the next We now summarize four categories of known attacks to which
node in the route and the message that it needs to send to this next OR is vulnerable and for which no general defenses are known.
node (which it sends using the underlying routing protocol). When
i = n, the message is just the core (d, M ), because, strictly speak- Global traffic analysis.
ing, there is no On+1 . We assume that d can infer from routing- OR was designed to be secure against a local adversary, i.e., one
protocol “header fields” of M that it is the intended recipient and that might eavesdrop on some network links and/or compromise
need not decrypt and forward. See Figure 1. some relay nodes but only a small percentage of each. It was not
Tor is a popular free-software suite based on OR. As explained designed for security against traffic analysis by a global adversary
on the Torproject website [1], “Tor protects you by bouncing your that can monitor large portions of the network constantly.
Figure 2: Traffic confirmation or fingerprinting to de-
anonymize onion-routing circuits
Figure 4: Example of an intersection attack