OK... I've added three more papers to the references section of the
mixnet directory authority rough draft specification:

   [FINGERPRINTING] "Route Finger printing in Anonymous Communications",
                    <https://www.cl.cam.ac.uk/~rnc1/anonroute.pdf>.

   [BRIDGING] Danezis, G., Syverson, P.,
              "Bridging and Fingerprinting: Epistemic Attacks on Route 
Selection",
              In the Proceedings of PETS 2008, Leuven, Belgium, July 2008,
              <https://www.freehaven.net/anonbib/cache/danezis-pet2008.pdf>.

   [LOCALVIEW] Gogolewski, M., Klonowski, M., Kutylowsky, M.,
               "Local View Attack on Anonymous Communication",
               
<https://www.freehaven.net/anonbib/cache/esorics05-Klonowski.pdf>.

The whole point of this project is "traffic analysis resistance".
I wonder, in general can we have nice things? Can we finally have a
cryptographic messaging system that protects against intersection
attacks? To that end I've been putting together a reading list so that
I can better understand how to write our decoy traffic specification.

// decoy traffic defenses

     [POOLDUMMY]  Diaz, C., Preneel, B.,
                  "Reasoning about the Anonymity Provided by Pool Mixes that 
Generate Dummy Traffic",
                  <https://www.freehaven.net/anonbib/cache/pool-dummy04.pdf>.

      [MIXDUMMY]  Diaz, C., Preneel, B.,
                  "Taxonomy of Mixes and Dummy Traffic",
                  <https://www.freehaven.net/anonbib/cache/taxonomy-dummy.pdf>.

   [DUMMYLIMITS]  Oya, S., Troncoso, C., Pérez-González, F.
                  "Do dummies pay off? Limits of dummy traffic protection in 
anonymous communications",
                  
<https://www.freehaven.net/anonbib/cache/pets14-dummy-traffic.pdf>.

                  Berthold, O., Langos, H.,
                  "Dummy Traffic Against Long Term Intersection Attacks",
                  In the Proceedings of the PETS 2002,
                  <https://www.freehaven.net/anonbib/cache/langos02.pdf>.

// alternate defenses

                Wolinksy, D., Syta, E., Ford, B.,
                "Hang with Your Buddies to Resist Intersection Attacks",
                In the Proceedings of the 20th ACM conference on CCS November 
2013,
                <https://www.freehaven.net/anonbib/cache/ccs2013-buddies.pdf>.

// attacks

    [STATSDISCO]  Danezis, G., Serjantov, A.,
                  "Statistical Disclosure or Intersection Attacks on Anonymity 
Systems",
                  In the Proceedings of 6th Information Hiding Workshop (IH 
2004), Toronto, May 2004.
                  <https://www.freehaven.net/anonbib/cache/DanSer04.ps>.

                  Danezis, G., Diaz, C., Troncoso, C.,
                  "Two-sided Statistical Disclosure Attack",
                  In the Proceedings of the PETS 2007,
                  <https://www.freehaven.net/anonbib/cache/danezis-pet2007.pdf>.

                  Troncoso, C., Gierlichs, B., Preneel, B., Verbauwhede, I.,
                  "Perfect Matching Disclosure Attacks",
                  In the Proceedings of the PETS 2008,
                  
<https://www.freehaven.net/anonbib/cache/troncoso-pet2008.pdf>.

                  Perez-Gonzalez, F., Troncoso, C.,
                  "Understanding Statistical Disclosure: A Least Squares 
approach",
                  In the Proceedings of the PETS 2012,
                  
<https://www.freehaven.net/anonbib/cache/leastsquares-pets12.pdf>.



On Fri, Nov 10, 2017 at 07:28:00PM +0000, Ximin Luo wrote:
> Michael Rogers:
> > On 10/11/17 14:31, Ximin Luo wrote:
> >>> So if we're asking whether a system may be vulnerable to the attack, and
> >>> it has the properties above, then we need to ask whether the system is
> >>> doing something to produce that countervailing tendency. In other words,
> >>> is it actively preventing the attack?
> >>>
> >>
> >> Indeed, I noted that the specific simple attack "assumes that nodes are 
> >> unable 
> >> to use any other information to distinguish between faulty vs good 
> >> neighbours.
> >>
> >> There are various things you can do along those lines, and the paper you 
> >> linked 
> >> includes a defense that based on their analysis is moderately effective. 
> >> I'm 
> >> sure there are improvements to be made though.
> > 
> > Absolutely. I'm not saying the eclipse attack rules out decentralised
> > solutions. I'm saying any decentralised solution needs to specify how
> > it's going to prevent the attack.
> > 
> > If you think that's trivial, take a look at MorphMix and the attacks
> > against it, and the papers from 2006-2010 that tried to do anonymous
> > routing over P2P networks, or use P2P networks to replace the Tor
> > directory system. I think most of them are cited by these two papers:
> > 
> > https://www.princeton.edu/~pmittal/publications/information-leaks-ccs08.pdf
> > 
> > http://www.usenix.net/legacy/events/hotsec10/tech/full_papers/Mittal.pdf
> > 
> > Again, I'm not saying it's impossible and we should all go home, but
> > it's definitely not a problem to be dismissed out of hand.
> > 
> 
> I'm not suggesting that it's trivial, but rather than I haven't been too 
> impressed with the examples and counterexamples cited so far as supposed 
> arguments against decentralised networks in general - not just from this 
> thread, but from other researchers as well. That's not meant to be taken 
> personally, it's just my view of the topic as a whole.
> 
> The collusion detection of MorphMix does not seem *particularly* advanced to 
> me, so I'm not surprised that an adversarial approach could break it. What 
> would be interesting would be to see papers that try to tackle the problem 
> from an adversarial point of view, including self-awareness about the flaws 
> in their own defense. That might eventually lead to more general theories 
> about the security and performance of decentralised networks, something that 
> I haven't seen much of yet. Some of the later stuff about community detection 
> was quite interesting, which is why I mentioned it earlier.
> 
> More generally, I can understand that this topic is a rabbit hole if all you 
> want to do is "just build an anonymous messaging system" - you have to know 
> much more about decentralised systems, etc. So if one's funding is limited 
> specifically to "build an anonymous messaging system" I can understand why 
> one's preference would be for centralised directory authorities. But I see 
> the development of decentralised systems as a wider goal that can have much 
> greater and wider benefits beyond just building anonymous messaging systems, 
> so that's why I maintain this interest in it.
> 
> Thanks for the papers though, will be interesting to give them a read through 
> in more detail.
> 
> >>>> Going back to the original issue (epistemic attacks against mixnets), 
> >>>> the key
> >>>> point AFAIU is to ensure that n ~= N. Whether this is achieved in a 
> >>>> centralised
> >>>> or decentralised way seems immaterial to me.
> >>>
> >>> The question isn't really the size of the view, but how much overlap
> >>> there is between the views of different users. Even if a user has some
> >>> way to know the value of N in a decentralised system (which is a hard
> >>> problem in its own right), how does she know whether the n ~= N nodes in
> >>> her own view are also in other users' views?
> >>>
> >>
> >> If n ~= N then the overlaps are much closer and you can follow the maths 
> >> in the 
> >> rest of the paper to see that the attack probabilities drop to very low.
> > 
> > That's fine for analysing the system from outside, where the set of N
> > nodes can be objectively known. But a user of the system doesn't have
> > that objective knowledge. She has a view of n nodes, but she doesn't
> > know N, so she can't tell to what extent her view overlaps with those of
> > other users. This isn't just an issue of user confidence, it's also a
> > practical problem: how does she know when she's learned about enough
> > nodes to start communicating?
> > 
> 
> I agree but I think this is a "given" if one was working in this area - i.e. 
> a system that claims to "guarantee n ~= N" would include the ability for each 
> participant know that that with high probability, that's what "guarantee" 
> means. If this wasn't met then the work would be a bad piece of work.
> 
> > Going back to the wider issue of epistemic attacks on anonymity systems,
> > it may not even be necessary for a user's view to differ much from those
> > of other users. For example, if the attacker can add a single node to a
> > victim's view that's not in any other user's view, then any traffic
> > passing through that node must come from the victim. So even n = N for
> > the victim, and n = N-1 for all other users, doesn't ensure safety.
> > 
> 
> Well, if N is large then the target has low probability of selecting the 
> poisoned node. Also if gossip was occurring then other nodes apart from the 
> target would also be contacting the poison node. It's not such a clear-cut 
> scenario to me, more mathematical analysis is required. :)
> 
> I also remain mildly skeptical of the focus on the specific threat model 
> where having 1 message deanonymised out of all of their messages counts as a 
> "loss" and that the focus of anonymity systems should be to reduce this 
> probability, even if it means sacrificing "average" deanonymisation 
> probability over all messages. But well, I haven't read very widely around 
> here, maybe there are position papers that argue this point properly and 
> solidly.
> 
> (Yes I understand that 1 messsage deanond means that many others might also 
> be deanond in practise, but some way of quantifying this would put this 
> assumption on a more solid footing. AIUI this was the main drive behind the 
> "1-guard-9-months" change in Tor a few years ago, but I didn't hear an 
> explanation of the *reason* behind this assumption yet, only "we assume".)
> 
> >>> I'm not interested in writing off decentralised systems any more than
> >>> you are, but there's a burden of proof here. Given the existence of a
> >>> pretty broad class of attacks that only apply to decentralised systems,
> >>> a decentralised system needs to show it's not vulnerable to those attacks.
> >>
> >> The attacks only work if the decentralised system literally makes no 
> >> effort to
> >> defend itself.
> > 
> > That would only be true if every effort was effective. Look at MorphMix,
> > for example. It had a clever defence to prevent an eclipse-like attack,
> > but the defence was defeated by modelling its internal state.
> > 
> 
> Sorry, I was being too succinct there. Yes, I meant "effective effort".
> 
> X
> 
> -- 
> GPG: ed25519/56034877E1F87C35
> GPG: rsa4096/1318EFAC5FBBDBCE
> https://github.com/infinity0/pubkeys.git

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Messaging mailing list
Messaging@moderncrypto.org
https://moderncrypto.org/mailman/listinfo/messaging

Reply via email to