Difference between revisions of "Simulation: Mixnets"

From Gender and Tech Resources

m (Mixnets)
m (Scenarios)
 
(7 intermediate revisions by the same user not shown)
Line 6: Line 6:
 
==== Props ====
 
==== Props ====
 
* Three different sizes of envelopes (such that the smallest fits the medium-size and medium-size fits the largest envelope). The envelopes need either be of different colour or feature coloured dots for easy observation. Add a message to a small envelope, the small envelope is placed in a medium size envelope, and that one in a large size envelope.
 
* Three different sizes of envelopes (such that the smallest fits the medium-size and medium-size fits the largest envelope). The envelopes need either be of different colour or feature coloured dots for easy observation. Add a message to a small envelope, the small envelope is placed in a medium size envelope, and that one in a large size envelope.
* Opaque containers (bags or cardboard boxes)
+
* Opaque containers (bags or cardboard boxes).
 +
* Colored ropes.
  
 
==== Roles ====
 
==== Roles ====
Line 42: Line 43:
 
=== Onion routing ===
 
=== Onion routing ===
  
''Mix networks get their security from the mixing done by their component mixes, and may or may not use route unpredictability to enhance security. Onion routing networks primarily get their security from choosing routes that are difficult for the adversary to observe, which for designs deployed to date has meant choosing unpredictable routes through a network. And onion routers typically employ no mixing at all. This gets at the essence of the two even if it is a bit too quick on both sides. Mixes are also usually intended to resist an adversary that can observe all traffic everywhere and, in some threat models, to actively change traffic. Onion routing assumes that an adversary who observes both ends of a communication path will completely break the anonymity of its traffic. Thus, onion routing networks are designed to resist a local adversary, one that can only see a subset of the network and the traffic on it.'' - Paul Syverson - Why I'm not an Entropist <ref>Why I'm not an Entropist http://freehaven.net/anonbib/cache/entropist.pdf</ref>
+
* Set up a simulated [[Networking_concepts#Tor_onion_routing|Tor network]]. Use colored ropes to represent circuits.
 
+
* Change routes (for the sake of the simulation every 3 minutes)
If I built a route from my machine in France, to a server in Australia, to a server in Russia, to a server in Australia, and then visit a webpage in France - there are a number of adversaries who could see part of this path. For example: people on our local network, our local ISP, the Chinese, Australian, Russian, and French governments, the website operator and their Internet Service Provider. Supposedly none of those entities are able to see the entire path because they do not own, control, or have direct influence over every network link I'm using.
+
* Have Cathy send Heathcliff a message. Can people in the room see that it was Cathy who passed a message to Heathcliff?  
 
+
* What if there are multiple messages being passed, can we still see?  
If an adversary is able to see the entire path, onion routing loses its security. Can people in the room see that it was Cathy who passed a message to Heathcliff? What if there are multiple messages being passed, can we still see? What if a country creates their own national internet and we set up Tor in this country? What if (policing or intelligence agencies) of countries share what they see?
+
* What if a country creates their own national internet and we set up Tor in this country? What if (policing or intelligence agencies) of countries share what they see?
  
 
=== Garlic routing ===
 
=== Garlic routing ===
 +
 +
The challenge: [[Networking_concepts#I2P_garlic_routing|build a simulation for understanding I2P]].
  
 
== Resources ==
 
== Resources ==
Line 55: Line 58:
 
* Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries http://www.nrl.navy.mil/itd/chacs/sites/www.nrl.navy.mil.itd.chacs/files/pdfs/13-1231-2077.pdf
 
* Users Get Routed: Traffic Correlation on Tor By Realistic Adversaries http://www.nrl.navy.mil/itd/chacs/sites/www.nrl.navy.mil.itd.chacs/files/pdfs/13-1231-2077.pdf
 
* Sleeping dogs lie on a bed of onions but wake when mixed https://www.petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf
 
* Sleeping dogs lie on a bed of onions but wake when mixed https://www.petsymposium.org/2011/papers/hotpets11-final10Syverson.pdf
 +
* Stakeout: how the FBI tracked and busted a Chicago Anon http://arstechnica.com/tech-policy/2012/03/stakeout-how-the-fbi-tracked-and-busted-a-chicago-anon/2/
 +
* How the NSA identifies Tor users in 6 easy steps http://www.dailydot.com/politics/six-steps-nsa-attack-tor/
  
 
=== Cutting off and national internets ===
 
=== Cutting off and national internets ===
Line 60: Line 65:
 
* How Do You Shut Down the Internet in a Whole Country? http://www.livescience.com/32965-how-do-you-shut-down-the-internet-whole-country.html
 
* How Do You Shut Down the Internet in a Whole Country? http://www.livescience.com/32965-how-do-you-shut-down-the-internet-whole-country.html
 
* Here Comes the National Internet http://www.pcmag.com/article2/0,2817,2398527,00.asp
 
* Here Comes the National Internet http://www.pcmag.com/article2/0,2817,2398527,00.asp
 +
 +
=== Garlic routing ===
 +
* Invisible Internet Project (I2P) https://geti2p.net/_static/pdf/i2p_philosophy.pdf
  
 
=== Dr. Who ===
 
=== Dr. Who ===

Latest revision as of 17:29, 11 August 2015

I'll be more enthusiastic about encouraging thinking outside the box when there's evidence of any thinking going on inside it. ~ Terry Pratchett [1]

Resources

Props

  • Three different sizes of envelopes (such that the smallest fits the medium-size and medium-size fits the largest envelope). The envelopes need either be of different colour or feature coloured dots for easy observation. Add a message to a small envelope, the small envelope is placed in a medium size envelope, and that one in a large size envelope.
  • Opaque containers (bags or cardboard boxes).
  • Colored ropes.

Roles

Enough people willing to play the parts

  • a network of at least 12 people holding boxes as mixnodes. People can be source and destination.
  • 3 extra destinations (services on servers).
  • Depending on what situation you are translating, a few people are playing ISP observers (those infamous black boxes placed at ISP's). For example, for creating a situation like in Egypt, have one ISP (that is directly talking to government).
  • Some people playing governments
  • Everybody not in one of the above roles can be observers, of which some report to governments.
	
      _____________              +---------+   _____________                       _____________                  _____________                _____________            
      |           |        +----------+   /|   |           |        +----------+   |           |                  |           |                |           |
      |           |   +----------+   /|__/ |   |           |   +----------+   /|   |           |   +----------+   |           |                |           |
      |           |   |\        /|__/ |_\__|   |           |   |\        /|__/ |   |           |   |\        /|   |           |                |           |
      |___________|   | \______/ |_\__|        |___________|   | \______/ |_\__|   |___________|   | \______/ |   |___________|                |___________|
        _|_____|_     |__/____\__|               _|_____|_     |__/____\__|          _|_____|_     |__/____\__|     _|_____|_                    _|_____|_
       / ******* \ ............................ / ******* \ ....................... / ******* \ .................. / ******* \ ................ / ******* \
      / ********* \                            / ********* \                       / ********* \                  / ********* \                / ********* \
     ---------------                          ---------------                     ---------------                ---------------              ---------------

Scenarios

Mixnets

See concepts of mix networks: As a getting started mixnet scenario you can use:

  • A few people make messages (message in smallest envelope, smallest envelope in medium sized envelope, and that one in the largest envelope) and place them in mixnodes (at random).
  • When having three messages in their box mix nodes remove one envelope for each message and distributed each message to a new mix node. If a mix node sees the final recipient of a message that message is forwarded to its destination.

Just have people send messages back and forth at different times to get the network in a "running state" with a clear "baseline" of observations.

Now ask the observers to focus on three senders to determine who gets whose message. And what else seems noteworthy. Play with mixnet parameters and scenarios.

Onion routing

  • Set up a simulated Tor network. Use colored ropes to represent circuits.
  • Change routes (for the sake of the simulation every 3 minutes)
  • Have Cathy send Heathcliff a message. Can people in the room see that it was Cathy who passed a message to Heathcliff?
  • What if there are multiple messages being passed, can we still see?
  • What if a country creates their own national internet and we set up Tor in this country? What if (policing or intelligence agencies) of countries share what they see?

Garlic routing

The challenge: build a simulation for understanding I2P.

Resources

Onion routing

Cutting off and national internets

Garlic routing

Dr. Who

Related

References

  1. Terry Pratchett https://www.goodreads.com/author/show/1654.Terry_Pratchett