[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] writeup of node-level analysis
Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/tmp/cvs-serv16274
Modified Files:
routing-zones.bib routing-zones.tex
Log Message:
writeup of node-level analysis
path analysis coming soon.
Index: routing-zones.bib
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.bib,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- routing-zones.bib 26 Jan 2004 20:35:22 -0000 1.8
+++ routing-zones.bib 26 Jan 2004 23:45:51 -0000 1.9
@@ -266,3 +266,12 @@
month = {January 14, },
year = {2004},
}
+
+@inproceedings {freedman:ccs02,
+ title = "Tarzan: A Peer-to-Peer Anonymizing Network Layer",
+ author = "Michael J. Freedman and Robert Morris",
+ booktitle = "Proceedings of the 9th {ACM} {C}onference on {C}omputer and {C}ommunications {S}ecurity",
+ address = "Washington, D.C.",
+ month = nov,
+ year = "2002"
+}
Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -d -r1.15 -r1.16
--- routing-zones.tex 26 Jan 2004 21:04:03 -0000 1.15
+++ routing-zones.tex 26 Jan 2004 23:45:51 -0000 1.16
@@ -281,7 +281,7 @@
advertise the routes learned from its provider to its customer, but not
to other peers.
-\begin{figure}
+\begin{figure}[t]
\begin{small}
\begin{verbatim}
Network Next Hop Metric LocPrf Weight Path
@@ -543,23 +543,105 @@
\section{Results}\label{sec:results}
-[We should of course take a look at these questions abstractly, to get a
-feel for how to answer them, but I'd like to get results on the actual
-real-world networks too. We need a cool new name for "zone-based
-attack".] Then we can see how stable the properties are: can we change
-things a lot by adding a few nodes, or do we need significant membership
-changes? -RD]
+In this section, we present the results of our analysis. First, we
+discuss the fundamental robustness properties of existing mix networks
+and how these properties would change in response to increased numbers
+and diversity of mix nodes. This analysis is independent of our model
+for mix network users (i.e., senders and receivers), since we are only
+examining properties of the mix nodes themselves. (To the extent
+possible, a user should try to minimize the ASes that can observe
+mutiple edges along a mix network path.) Second, we use our estimates
+for typical locations of senders and receivers to determine the
+robustness properties of current node selection algorithms in mix
+networks; again, we note how these properties change as the number and
+diversity of mix nodes increases.
+%% [We should of course take a look at these questions abstractly, to get a
+%% feel for how to answer them, but I'd like to get results on the actual
+%% real-world networks too. We need a cool new name for "zone-based
+%% attack".] Then we can see how stable the properties are: can we change
+%% things a lot by adding a few nodes, or do we need significant membership
+%% changes? -RD]
%% I can easily make a list of current
%% Tor nodes, current Mixminion nodes, current Mixmaster nodes, and we
%% can compare robustness of the network to zone-based attacks.
\subsection{Fundamental AS-level Properties of Mix Nodes and Paths}
+In this section, we explore the extent to which the nodes and paths are
+independent. First, we analyze the ASes in which the mix nodes are
+located, for the existing Tor and Mixmaster networks. Next, we examine
+the path properties between pairs of existing mix nodes and characterize
+the extent to which the AS-level paths pairwise mix nodes traverse
+common ASes. Finally, we analyze the extent to which these properties
+are dependent on the current set of nodes in each mix network;
+specifically, we examine how these robustness properties change in
+response to increased mix node diversity (i.e., more mix nodes, and more
+mix nodes in more diverse geographic locations).
+
+\subsubsection{Node properties}
+
+The tables in Appendix~\ref{sec:mixnode_summary} show that both the
+Mixmaster and Tor networks have multiple nodes in the same AS. Tor has
+three mix nodes in AS 23504 (Speakeasy DSL), and Mixmaster has two nodes
+each in ASes 3269 (Telecom Italia), 6939 (Hurricane Electric), 7132
+(SBC), 23504 (Speakeasy DSL), and 24940 (Hetzner Online). This lack of
+jurisdictional independence in node placement it not surprising; in
+particular, it seems to reflect the fact that these network nodes are
+operated by {\em volunteers}, many of whom commonly operate mix nodes
+from their Internet connections at home (i.e., DSL providers, etc.).
+However, the fact that there both of these networks have multiple nodes
+located in the same jurisdiction suggests that users of these mix
+networks should exercise caution when selecting mix nodes (particularly
+the entry and exit nodes).
+
+Previous work (and conventional wisdom) has suggested that selecting
+nodes from disjoint subsets of the IP address space will achieve
+independence in node placement; it is clear from our survey of Mixmaster
+and Tor that these types of prefix-based mechanisms are, in general,
+ineffective, and they can lead the user of the mix network into a false
+sense of security. For example, Tarzan suggests subdividing the node
+space into {\tt /16} prefixes, and subsequently into {\tt /24} prefixes
+and selecting nodes from distinct subsets of the IP prefix space to
+reduce the liklihood that two mix nodes are in the jurisdiction of a
+single AS~\cite{freedman:ccs02}. Unfortunately, this technique does not
+necessarily increase the likelihood of jurisdictional independence: of
+the five pairs Mixmaster nodes that are located in the same AS, three of
+these pairs (those in ASes 3269, 7132, and 23504) not only have distinct
+{\tt /16} prefixes, they also have distinct {\tt /8} prefixes.
+Simiarly, one of the Tor network nodes in AS 23504 has a distinct {\tt
+/16} prefix. This suggests that, to achieve jurisdictional
+independence, a mix network should explicitly consider the actual AS of
+a host, not simply its IP address.
+
+Finally, we note that all of the Tor network's exit nodes are currently
+located in the United States. In practice, this network could achieve
+greater jurisdictional independence by increasing exit node
+participation outside of the US.
+
+
+\subsubsection{Path properties}
+
+\begin{table}[t]
+\begin{tabular}{r|p{1.25in}|p{0.5in}p{0.5in}p{0.5in}p{0.5in}}
+{\bf Mix Network} & \parbox{1.25in}{{\centering\bf \# of \\ AS-disjoint Edges}} &
+\multicolumn{4}{c}{{\bf \# of Edges with $n$ common ASes}} \\
+& & \parbox{0.5in}{\centering 1} & \parbox{0.5in}{\centering 2} & \parbox{0.5in}{\centering 3} & \parbox{0.5in}{\centering 4+} \\ \hline
+Tor \\
+Mixmaster\\
+\end{tabular}
+\vspace{0.1in}
+\caption{Characterizing jurisdictional independence in today's mix
+ networks.}
+\label{tab:path_ind}
+\end{table}
+
Fraction/number of mix paths with overlapping ASes for each network.
Note that increasing mix path length doesn't necessarily mean more
-anonymity.
+anonymity. Table~\ref{tab:path_ind}.
+
+\subsubsection{Effects of Membership Diversity}
\subsection{Jurisdictional Attacks on Entry and Exit Paths}
@@ -626,6 +708,9 @@
Proposed some design recommendations for Tor (or, depending on
our results, found that the Tor selection works reasonably
well).
+%temporary spacer while we don't have a conclusion to make sure things
+% don't look ridiculous, aesthetically
+\vspace{6in}
%\section*{Acknowledgements}
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/