[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] First cut of first 2/3 of new section 2. Needs major w...



Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/tmp/cvs-serv4588/doc

Modified Files:
	minion-design.tex 
Log Message:
First cut of first 2/3 of new section 2.  Needs major work still. Need to write attacks section.

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -d -r1.61 -r1.62
--- minion-design.tex	1 Nov 2002 20:15:27 -0000	1.61
+++ minion-design.tex	2 Nov 2002 06:44:48 -0000	1.62
@@ -73,7 +73,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Overview}
+\section{Introduction}
 \label{sec:intro}
 
 Chaum first introduced anonymous remailers over 20 years ago
@@ -126,7 +126,7 @@
 
 \item \textbf{Replay prevention and key rotation:} ...
 
-\item \textbf{Directory servers:} Mixmaster uses several \emph{ad hoc}
+\item \textbf{Integrated directory servers:} Mixmaster uses several \emph{ad hoc}
 approaches to distributing remailer availability, performance, and
 key information. But the fact that users and remailers operate with
 different information introduces \emph{partitioning} attacks. Mixminion
@@ -164,6 +164,125 @@
 %researchers and Mixmaster remailer operators. This design document
 %represents the first step in peer review of the Type III remailer
 %protocol.
+
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+\section{Overview and background}
+%% This is a new 'overview' section to come after the toplevel
+%% intro; with content as suggested by Roger.  I don't know what we
+%% should rename the intro to.
+%%
+%% Also, the writing here NEEDS to be cleaned up.  -NM
+%
+% What's a MIX-net?
+In a MIX-net, message senders achieve anonymity by routing their
+messages through a path of relay servers, or `MIXes.'  When Alice
+wants to send an anonymous message to Bob through the MIXes $M_1$,
+$M_2$, and $M_3$, she encrypts her message successively with the
+public keys of the mixes in reverse order, and includes routing
+information for each MIX, so that each MIX $M_i$ receives the address
+of $M_{i+1}$ along with the payload intended for $M_{i+1}$, all
+encrypted with $M_i$'s public key.  
+% This is kind of unclear.  Maybe integrate the paragraph from below
+% that says 'mixminion uses the same general MIX-net paradigm...'
+% 
+% needs references, too
+
+% What do MIXes do?
+When a MIX receives a message, it decrypts it with its public key, 
+and delays it according to some `batching rule' so that an observer
+cannot easily associate its outputs with its inputs.  It then sends
+extracts the address of the next MIX in the sequence from the
+decrypted message, and delivers the contents of the message to the
+next MIX.
+
+% XXXX Mention how this provides any anonymity!
+
+% What's a reply block?
+When recipients want to achieve anonymity, some MIX-net designs allow
+them to construct \empf{reply blocks} that allow others to send
+messages to them without knowing their identities.  A reply block
+contains only the routing portion of a message; the actual contents
+are provided by the user that eventually sends a message to the
+recipient.
+
+% How does mixminion fit in?
+Mixminion's principal difference from earlier MIX-net designs is the
+mechanism it uses to support reply messages with the same processing
+machinery as non-reply messages, while at the same time resisting the
+attacks described below in REF.
+% This could be phrasesd far better
+
+\subsection{Design goals and assumptions}
+% this needs more material, and a bit less 'attitude' :)
+
+% Server requirements
+First of all, the system must be relatively simple to deploy.  Past
+systems have never found it easy to get a reliable pool of MIX
+operators to run long-lived servers; Mixminion must add as few
+technical barriers as possible.  Thus, we require that our protocol
+require only loose clock synchronization (within a few minutes);
+that it achieve acceptable performance on commodity hardware, and 
+that it require little coordination between servers.
+
+% Client requriements
+Furthermore, software adoption has also been a barrier to past
+systems. (REF?) Thus, we require that only users who receive anonymity
+from the system need to run special software -- that is, users should
+be able to receive messages from anonymous senders and send messages
+to anonymous recipients without any support beyond a standard email
+client.  Users must also be able to send and receive anonymous
+messages using only commodity hardware.  Finally, although users with
+persistant network connections are necessarily more resistant to
+intersection attacks than users with intermittent connections (see
+REF below), the system must still support users with intermittent
+connections and offer them as much anonymity as possible.
+
+For an adversary model, we assume a well-funded attacker who can
+observe all or most traffic on the network, who can generate, modify,
+delete, or delay traffic on the network, who can operate MIXes of its
+own, and who can compromise some fraction of the MIXes on the network.
+We assume that such an adversary is attempting to compromise users'
+anonymity by learning (or guessing with a reasonable probability) who
+is communicating with whom.
+%What else is the adversary trying to do?
+
+We want to resist
+
+replies: we want to avoid partitioning by having reply messages be
+   indistinguishable from forward messages, and just as secure.  To the
+   extent possible, a MIX should not be able to learn any more from a
+   message's contents than from the fact of the message's receipt.
+
+
+\subsection{Known attacks against MIX-nets}
+
+The largest class of passive attacks against 
+
+-control servers
+-compromise servers
+
+-replay
+
+-delaying
+-dropping
+-textual analysis
+
+-partitioning
+
+-tagging attacks
+
+-(n-1) attack
+
+-directory-related attacks
+
+-flooding attack
+
+-delaying attack
+
+-timing attacks
+
+-intersection attacks
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%