NYMBLE: Blocking Misbehaving Users in Anonymizing Networks
NYMBLE: Blocking Misbehaving Users in Anonymizing Networks
OUTLINE:
Abstract
Introduction
Earlier solutions and their drawbacks
ABSTRACT:
Anonymizing networks such as Tor allow users to access
Internet services privately by using a series of routers to hide the clients IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such
As a result, administrators block all known exit nodes of anonymizing networks, denying anonymous access to
misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers definitions of misbehaviorservers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained.
INTRODUCTION:
ANONYMIZING networks such as Tor clients IP address. Unfortunately, some users have misused such networksunder the route traffic through
Cont
In other words, a few bad apples can spoil the fun for all.(This has happened repeatedly with Tor.1)
Servers must query the group manager for every authentication, and thus,
lacks scalability. Traceable signatures allow the group manager to release a trapdoor that allows all signatures generated by a particular user to be traced; such an approach does not provide the backward unlinkability that we desire, where a users accesses before the complaint remain anonymous. Backward unlinkability allows for what we call subjective blacklisting, where servers can blacklist users for whatever reason since the privacy of the blacklisted user is not at risk. In contrast, approaches without backward unlinkability need to paycareful attention to when and why a user must have all their connections linked, and users must worry about whether their behaviors will be judged fairly.
SUBJECTIVE BLACKLISTING:
Subjective blacklisting is also better suited to servers such as Wikipedia, where misbehaviors such as questionable edits to a Webpage, are hard to define in mathematical terms. In some systems, misbehavior can indeed be defined precisely. For instance, double spending of an e-coin is considered a misbehavior in anonymous e-cash systems following which the offending user is deanonymized. Unfortunately, such systems work for only narrow definitions of misbehaviorit is difficult to map more complex notions of misbehavior onto double spending or related approaches .
OUR SOLUTION:
We present a secure system called Nymble, which provides all the following properties: anonymous authentication, backward unlinkability, subjective blacklisting, fast authentication speeds, rate-limited
The Nymble system architecture showing the various modes of interaction. Users interact with the NM and servers though the
anonymizing network.
NYMBLE MANAGER:
After obtaining a pseudonym from the PM, the user connects to the Nymble Manager (NM) through the anonymizing network, and requests nymbles for
The life cycle of a misbehaving user. If the server complains in time period tc about a users connection in t, the user becomes linkable starting in tc. The complaint in tc can include nymble tickets from only tc1 and earlier.
TIME : Nymble tickets are bound to specific time periods. Time is divided into linkability windows of duration W, each of which is split into L time periods of duration T (i.e., W L T ).
the use of different nymble tickets across time periods grants the user
anonymity between time periods. Smaller time periods provide users with higher rates of anonymous authentication, while longer time periods allow servers to rate-limit the number of misbehaviors from a particular user before he or she is blocked. For example, T could be set to five minutes, and W to one day (and thus, L 288).
The linkability window allows for dynamism since resources such as IP addresses can get reassigned and it is undesirable to blacklist such resources indefinitely, and it ensures forgiveness of misbehavior after a certain period of time. We assume all entities are time synchronized (for example, with time.nist.gov via the Network Time Protocol (NTP)), and can thus calculate the current linkability window and time period.
BLACKLISTING A USER:
If a user misbehaves, the server may link any future connection from this user within the current linkability window (e.g., the same day). A user connects and misbehaves at a server during time period t within linkability window w. The server later detects this misbehavior and complains to the NM in time period tc (t < tc tL) of the same linkability window w. As part of the complaint, the server presents the nymble ticket of the misbehaving user and obtains the corresponding seed from the NM.
The server is then able to link future connections by the user in time periods tc; tc 1; . . . ; tL of the same linkability window w to the complaint. Therefore, once the server has complained about a user, that
user is blacklisted for the rest of the day, for example (the
linkability window). Note that the users connections in t1; t2; . . . ; t; t 1; . . . ; tc remain unlinkable (i.e., including those since the misbehavior and until the time of complaint). Even though misbehaving users can be blocked from making connections in the future, the users pastconnections remain unlinkable,
CONCLUSIONS
We have proposed and built a comprehensive credential system called Nymble, which can be used to add a layer of accountability to any
practical, efficient, and sensitive to the needs of both users and services.