[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] Added some more correction.



Update of /home/minion/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv6414

Modified Files:
	minion-design.bib minion-design.tex 
Log Message:
Added some more correction.
Citation to textual deanonymization attacks.
Cleared the Nym server section from strange notation.



Index: minion-design.bib
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.bib,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -d -r1.18 -r1.19
--- minion-design.bib	3 Mar 2003 11:00:06 -0000	1.18
+++ minion-design.bib	3 Mar 2003 16:37:03 -0000	1.19
@@ -1,3 +1,16 @@
+@inproceedings{ rao-pseudonymity,
+    author = "Josyula R. Rao and Pankaj Rohatgi",
+    title = "Can Pseudonymity Really Guarantee Privacy?",
+    booktitle = "Proceedings of the Ninth USENIX Security Symposium",
+    year = {2000},
+    month = Aug,
+    publisher = {USENIX},
+    isbn = { 1-88044-618-9 },
+    location = {Denver, Colorado},
+    pages = "85--96",
+    url = "citeseer.nj.nec.com/473267.html",
+    url = "http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf"; }
+
 @InProceedings{pfitzmann90how,
     author = "Birgit Pfitzmann and Andreas Pfitzmann",
     title = "How to Break the Direct {RSA}-Implementation of {MIXes}",

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -d -r1.104 -r1.105
--- minion-design.tex	3 Mar 2003 10:36:01 -0000	1.104
+++ minion-design.tex	3 Mar 2003 16:37:03 -0000	1.105
@@ -1028,7 +1028,9 @@
 \label{subsec:exitpolicies}
 
 One important entry in a node's capability block is its \emph{exit
-policy}. Exit abuse is a serious barrier to wide-scale remailer deployment
+policy}, that describes to which address and by which method a mix node is
+prepared to deliver messages. Exit abuse is a serious barrier to
+wide-scale remailer deployment 
 --- rare indeed is the network administrator tolerant of machines that
 potentially deliver hate mail. % to the U.S. President.
 
@@ -1056,7 +1058,9 @@
 Similarly, if receiving mail is opt-out, an abuser can deny service
 by forging an opt-out request from a legitimate user. We use a compromise,
 where all users are assumed to want to receive mail, but each Mixminion
-message arrives with instructions on how to opt out. Specifically, the
+message arrives with instructions on how to opt out. 
+% XXX Is this true? (in spec or actual implemetation): 
+Specifically, the
 message includes a secret that must be used to authorize the opt-out. Thus
 adversaries who cannot read the victim's mail cannot forge an opt-out
 request.  (We believe that restricting ourselves to such adversaries is
@@ -1273,7 +1277,7 @@
 nymservers from single-use reply blocks.
 
 In the first approach, nymservers keep a stock of reply blocks for
-each mailbox, and use a new reply block for each incoming message. 
+each mailbox, and use a new reply block $\alpha_i$ for each incoming message. 
 Suppose Alice wants to register a pseudonym $\alpha$ with signature and
 verification keys $(S_\alpha,V_\alpha)$ with the Nym server in order
 to receive messages from Bob.  In this case, the parties communicate as
@@ -1281,10 +1285,10 @@
 
 \begin{equation}
 \begin{aligned}
-(A)^\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Register} , \alpha, V_{\alpha}, (A)^\alpha_1 \dots
-(A)^\alpha_n\}_{S_\alpha} \\ 
+\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Register} , \alpha, V_{\alpha}, \alpha_1 \dots
+\alpha_n\}_{S_\alpha} \\ 
 B \rightarrow \mathrm{Nym}&: \alpha, M \\ 
-\mathrm{Nym} \rightarrow (A)^\alpha_i&: M \\
+\mathrm{Nym} \rightarrow \alpha_i&: M \\
 \end{aligned}
 \end{equation}
 
@@ -1304,11 +1308,11 @@
 
 \begin{equation}
 \begin{aligned}
-(A)^\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Register} , \alpha, V_{\alpha}\}_{S_{\alpha}}\\
+\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Register} , \alpha, V_{\alpha}\}_{S_{\alpha}}\\
 B \rightarrow \mathrm{Nym}&: \alpha, M \\
-(A)^\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Query} ,\alpha, (A)^\alpha_1 \dots
-(A)^\alpha_n\}_{S_{\alpha}} \\
-\mathrm{Nym} \rightarrow (A)^\alpha_i&: M
+\alpha \rightarrow \mathrm{Nym}&: \{\mathrm{Query} ,\alpha, \alpha_1 \dots
+\alpha_n\}_{S_{\alpha}} \\
+\mathrm{Nym} \rightarrow \alpha_i&: M
 \end{aligned}
 \end{equation}
 
@@ -1376,7 +1380,9 @@
 completely flush the mix with high probability in one flush. An adversary
 is forced to spend multiple intervals (and thus delay other messages
 for considerable time) first to flush the original honest messages from
-the mix, and again to flush the target message from the mix. This delay
+the mix, and again to flush the target message from the mix. 
+% XXXX Is this true? Do we implement or even specify a heartbeat? -GD
+This delay
 can be noticed by the other mixes, because they communicate over TLS
 with a heartbeat to detect delays.
 % XXXX Huh? Heartbeat? -NM
@@ -1438,7 +1444,8 @@
 When Alice (the owner of a pseudonym) downloads her mail from a
 nymserver, she will likely receive many separate messages. Similarly, if
 Alice uses Mixminion as a transport layer for higher-level applications,
-sending a large file means sending many Mixminion messages.
+sending a large file means sending many Mixminion messages, because of
+their fixed size.
 Conventional wisdom suggests that she should pick a different
 % can I get a \cite here? -RRD
 path for every message, but an adversary that owns all the nodes in
@@ -1493,10 +1500,11 @@
 \begin{itemize}
 \item \emph{Compromise a mix.} Messages traverse multiple mixes, so
 compromising a single mix, even a crossover point, does not gain much.
-\item \emph{Compromise a mix's private key.} Again, owning a single mix
+\item \emph{Compromise a mix's private key.} Again, `owning' a single mix
 is of limited use. Further, periodic mix key rotation limits the window
 of time in which to attack the next mix in the target message's path.
-\item \emph{Replaying messages.}  Mixes remember header checksums of
+\item \emph{Replaying messages.}  Mixes remember header cryptographic 
+checksums of
 previously seen messages; after key rotation these old headers can no
 longer be decrypted.
 \item \emph{Delaying messages.} The adversary can delay messages and
@@ -1505,12 +1513,12 @@
 well be quite damaging \cite{trickle02}. Imposing a deadline on
 transmission at each hop may help \cite{mix-acc}.
 \item \emph{Dropping messages.} The adversary can drop messages with the
-hope that users will notice and resend. If the user must resend, he
-should use the same path, to prevent the adversary from forcing him onto
+hope that users will notice and resend. If the user must resend, she
+should use the same path, to prevent the adversary from forcing her onto
 an adversary-controlled path (see Section \ref{subsec:many-messages}).
 \item \emph{Tagging messages.} Mixes detect modified headers immediately
 using checksums. The payload can still be tagged, but the ``swap'' step
-along with LIONESS encryption from Section \ref{subsec:header-swap}
+along with SPRP encryption from Section \ref{subsec:header-swap}
 provide protection.
 \item \emph{N$-1$ attack (trickle, flooding)} The ``timed dynamic-pool''
 batching strategy from Section \ref{subsec:batching}, along with our dummy
@@ -1528,7 +1536,8 @@
 solution remains an open problem \cite{langos02}.
 \item \emph{Textual analysis.} Mixminion provides location anonymity,
 not data anonymity. Users are responsible for making sure their messages
-do not reveal identifying information.
+do not reveal identifying information. Such attacks are practical, and
+therefore a real threat, as documented in \cite{rao-pseudonymity}.
 \end{itemize}
 
 \item \textbf{Exit attacks}
@@ -1601,7 +1610,7 @@
 \item Can we keep the indistinguishability of forward messages and
 replies using a simpler design? We need to prove that our design provides
 unlinkability between the input bit-patterns of messages and the messages
-coming out of the network.
+coming out of the network (\emph{bit-wise unlinkability}).
 \item Currently, reply messages can be distinguished from plaintext forward
 messages at the exit nodes: the former exit as encrypted data, and the
 latter do not.  We prevent further partitioning by arranging