[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[minion-cvs] more on the attacks section
Update of /home/minion/cvsroot/doc
In directory moria.seul.org:/home/arma/work/minion/doc
Modified Files:
minion-design.tex
Log Message:
more on the attacks section
Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -d -r1.79 -r1.80
--- minion-design.tex 6 Nov 2002 02:04:03 -0000 1.79
+++ minion-design.tex 6 Nov 2002 02:57:07 -0000 1.80
@@ -1384,6 +1384,7 @@
created by the adversary.
\subsection{Transmitting many messages}
+\label{subsec:many-messages}
When Alice (the owner of a pseudonym) downloads her mail from a
nymserver, she will likely receive many separate messages. Similarly, if
@@ -1432,57 +1433,81 @@
\section{Attacks and Defenses}
\label{sec:attacks}
-%
-%[Do something akin to pages 13-15 of
-%\url{http://freehaven.net/doc/casc-rep/casc-rep.ps}.]
-%XXXX WRITE SOMETHING HERE! -NM
+Below we summarize a variety of attacks and how well our design withstands
+them.
-\subsubsection{Passive attacks}
-\label{subsec:passive-attacks}
+\subsubsection{Mix attacks}
+\label{subsec:mix-attacks}
\begin{description}
-\item \emph{Intersection attack (short-term, long-term)} XXXX
-\item \emph{Textual analysis} XXXX
+\item \emph{Compromise a mix} Because messages traverse multiple mixes,
+compromising a single mix, even a crossover point, does not gain much.
+\item \emph{Compromise a mix's private key} Again, owning a single mix
+is of limited use. Further, periodic mix key rotation limits the window
+of time in which to attack the next mix in the target message's path.
+\item \emph{Message replay.} Mixes remember header checksums of
+previously seen messages; after key rotation these old headers can no
+longer be decrypted.
+\item \emph{Message delay.} The adversary can delay messages and
+release them when certain network parameters (eg traffic volume) are
+different. The efficacy of this attack is poorly understood, but it may
+well be quite damaging \cite{batching-taxonomy}. Imposing a deadline on
+transmission for each hop may help \cite{mix-acc}.
+\item \emph{Message dropping.} The adversary can drop messages with the
+hope that users will notice and resend. If the user must resend, he
+should use the same path, to prevent the adversary from forcing him onto
+an adversary-controlled path (see Section \ref{subsec:many-messages}).
+\item \emph{Message tagging.} Mixes detect modified headers immediately
+using checksums. The payload can still be tagged, but the ``swap'' step
+along with LIONESS encryption from Section \ref{subsec:header-swap}
+provide protection.
+\item \emph{N$-1$ attack (trickle, flooding)} The ``timed dynamic-pool''
+batching strategy from Section \ref{subsec:batching} limits the
+effectiveness of these attacks.
\end{description}
-\subsubsection{Mix attacks}
-\label{subsec:mix-attacks}
+\subsubsection{Passive attacks}
+\label{subsec:passive-attacks}
\begin{description}
-\item \emph{Compromise a mix} XXXX
-\item \emph{Compromise a mix's private key} XXXX
-\item \emph{Replay attack.} Servers remember header checksums in
- between key rotations; after keys are discarded, old headers can no
- longer be decrypted.
-\item \emph{Message delaying.} XXXX
-\item \emph{Message dropping.} XXXX
-\item \emph{Message tagging.} Header checksums allow servers to
- detect modified headers. Using LIONESS on the payload prevents modified
- payloads from being distinguishable from junk. Finally, the
- ``swap'' step renders exit path of a message irretrievable if the
- payload is modified.
-\item \emph{N$-1$ attack (trickle, flooding)} The `timed dynamic-pool'
- batching strategy limits the effectiveness of these attacks.
+\item \emph{Intersection attack.} Our dynamic-pool batching strategy
+from Section \ref{subsec:batching} spreads out the set of possible
+senders for a given received message, increasing the cost of an
+intersection attack. However, a complete solution remains an open problem
+\cite{langos02}.
+\item \emph{Textual analysis.} Mixminion provides location anonymity,
+not data anonymity. Users are responsible for making sure their messages
+do not reveal information.
\end{description}
-\subsubsection{Exit-based attacks}
+\subsubsection{Exit attacks}
\label{subsec:attacks-exitbased}
\begin{description}
-\item \emph{Use delivery method to partition traffic .} XXXX
-\item \emph{Use servers' exit capabilities to partition traffic.} XXXX
+\item \emph{Use delivery method to partition traffic.} We encourage
+recipients to use one of only a few delivery methods, so we can maintain
+sufficient anonymity sets for each.
+\item \emph{Use servers' exit capabilities to partition traffic.}
+Delivery methods should be standardized; users should be suspicious of
+any exit node offering an unusual delivery method.
+\item \emph{Use the mix network to deliver hate mail, etc.} We allow
+recipients to opt out of receiving further mail. Overall, we must assume
+we will have enough nodes that can withstand this abuse that simple
+adversaries cannot monitor all exit nodes in the network.
+% help, please untangle my words
\end{description}
-\subsubsection{Directory-based attacks}
+\subsubsection{Directory attacks}
\label{subsec:attacks-dirbased}
\begin{description}
\item \emph{Compromise a directory server.} Identical directory listings
are served by a large group of servers, and signed by all.
-\item \emph{Lie to a directory server.} Signed capability blocks, and
- the fact that a mix's signing key is its identity, prevent this
- attack.
+\item \emph{Lie to a directory server.} Signatures on capability
+ blocks prevent others from forging them to the directory
+ servers. Because a mix's signing key is its identity,
+
\item \emph{Exploit differences in client directory knowledge.} By
only updating directory information nightly; by urging client
software to pull updates as soon as possible after their release;