Re: [Privacy-pass] Detecting malicious registries/servers

Steven Valdez <svaldez@google.com> Tue, 04 August 2020 13:07 UTC

Return-Path: <svaldez@google.com>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E902E3A0B41 for <privacy-pass@ietfa.amsl.com>; Tue, 4 Aug 2020 06:07:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HDgDxVo_tM6L for <privacy-pass@ietfa.amsl.com>; Tue, 4 Aug 2020 06:07:15 -0700 (PDT)
Received: from mail-oi1-x230.google.com (mail-oi1-x230.google.com [IPv6:2607:f8b0:4864:20::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78B693A0B34 for <privacy-pass@ietf.org>; Tue, 4 Aug 2020 06:07:15 -0700 (PDT)
Received: by mail-oi1-x230.google.com with SMTP id o21so15524080oie.12 for <privacy-pass@ietf.org>; Tue, 04 Aug 2020 06:07:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=AcIw/lzAkoSw3XNLKYJhMH3wKy85KNXMcCyfZf7YNpU=; b=mgwSkaxkHjCBJ9Xm/JU1sl3fBXVrusNXCEAkbTaSiZ/xLSyGFUyyxGWV7jVq43XK1f rZmxDC6+vACli5OsHwedxtskwcwdIqllCeON1ufA3d+U8ZTEw/D5C4BoAnH4FiUKDEkj SxrjLKBZlpVzJDx5pIysRXz4x+bJ4dDudEjwIRS/sfu/8fSgrhA69aCssIfrj3Ryh0n8 1N6PxNpyeqqUqc+21XoESYODUpMDiXSuQX73EacxQSKgzGlHohql7riSgyY6PmGQ5O5g GnPMoBsk1kP4hxcyuvREz9Hp1UeFDLAnK0NOmXI80hVfPPOSE3l95R6HnrStOZTjoeEa 5N+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=AcIw/lzAkoSw3XNLKYJhMH3wKy85KNXMcCyfZf7YNpU=; b=aJHSECDGMIyCwCF6M+4TFRZ5kzQQfF02FLx+4NQQrrncC5XPZb+y9wX+Hcicngdae/ m2XfzVNIPy5Cj5zGWQYvp3GxxqaKuDaWCyfOdDnGGpblOKocCT/EUvlNPmxyrVM26FBQ QcV7Yj7n0crMvh8dVKLA5dj3me5E8THETIXwoe8jtrQnV4Mczne9ARiaz29XVDemAq6T EyctF2tw/3smRRO3E38N4uHyQtCu0+PVqF6o0k5eXI1dDXnjOCL3Bh0jfIfcL6n/6QtP gepy7GFHwAYVuNpaYR2mSAqiHgx4pMt39K+2u1hJMDjBjmPwJOOAMPtzqNzgp9llKh79 LTwQ==
X-Gm-Message-State: AOAM53084IH0QRKKOJ0bpVPlabcZ5BVh7wTdSazkGsMfBhUQM2pkM5bS iv3BvGp/t2qpl1TsLRldpHppH/SU0rRY9vz1dbHVKA==
X-Google-Smtp-Source: ABdhPJy+Z+l/1vzsnqvHmdjh9Xfn3JTBRWmMZUBxG/j5AFK5BEMsnLNvgqGtpw+wsUBtlATRvD70kvNxMEhhLodol7E=
X-Received: by 2002:a05:6808:82:: with SMTP id s2mr3284726oic.11.1596546434487; Tue, 04 Aug 2020 06:07:14 -0700 (PDT)
MIME-Version: 1.0
References: <CAJoqpT+U9QAHqncX0Aj2yWRaNRBgqE4ZG4k7Yx7xHtevsQ8EVA@mail.gmail.com> <CAHbrMsD9RtVS+zLscxvDJrynzDsuogEpdWqvBJRJVg2czkC+xg@mail.gmail.com> <a54fe9678b294cc49835ca642a098ba1@uwaterloo.ca>
In-Reply-To: <a54fe9678b294cc49835ca642a098ba1@uwaterloo.ca>
From: Steven Valdez <svaldez@google.com>
Date: Tue, 04 Aug 2020 09:07:00 -0400
Message-ID: <CANduzxDg2Rvy8j7kAsNJ9QaX6Qaa7EFT08WfjVHwoB3Up7+btA@mail.gmail.com>
To: Chelsea Komlo <ckomlo@uwaterloo.ca>
Cc: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, Chelsea Komlo <chelsea.komlo@gmail.com>, "privacy-pass@ietf.org" <privacy-pass@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000018e12a05ac0cef2d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/hBibQlKIjYIFirSMUP7tPqV_1z0>
Subject: Re: [Privacy-pass] Detecting malicious registries/servers
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Aug 2020 13:07:18 -0000

I don't think the Privacy Pass drafts can really solve the unlinkable
communication problem, and shouldn't focus on it besides listing it as a
requirement. Depending on the use case/caller, communicating with the
Issuer/Redeemer in an unlinkable way could involve making completely
disconnected TLS/HTTP connections, dropping all state (some sort of
anonymous mode), changing request patterns so they can't be time
correlated, etc.

PrivacyPass can make the protocol robust against unlinkability based on the
contents of protocol messages, but solving unlinkability based on the
transport seems outside of the PrivacyPass scope, though listing the
requirements that would be maintained could be useful for use cases built
on top of Privacy Pass.

On Mon, Aug 3, 2020 at 6:14 PM Chelsea Komlo <ckomlo@uwaterloo.ca> wrote:

> It seems there was a slight miscommunication with the point I was trying
> to make during the meeting, so I'll clarify.
>
>
> I am strongly in favor of making the protocol as robust as possible, while
> being transparent about what risks cannot be mitigated in certain settings
> (such as servers building a lookup table).
>
>
> Placing the burden on implementations to figure out how to ensure the
> primary use case of the protocol- unlinkability- is counterintuitive to me.
>
>
>
>
> ------------------------------
> *From:* Privacy-pass <privacy-pass-bounces@ietf.org> on behalf of Ben
> Schwartz <bemasc=40google.com@dmarc.ietf.org>
> *Sent:* Monday, August 3, 2020 9:59:59 AM
> *To:* Chelsea Komlo
> *Cc:* privacy-pass@ietf.org
> *Subject:* Re: [Privacy-pass] Detecting malicious registries/servers
>
> I found your and Richard's comment during the meeting particularly
> insightful on this point: we should clarify the assumptions Privacy Pass
> has to make about the intrinsic identifiability of client requests.  For
> example, if Privacy Pass necessarily assumes that the Client's connections
> to Verifiers are unlinkable, then perhaps we can simply declare that the
> Client's connections to Registries must be similarly unlinkable.
>
> The mechanism for ensuring that unlinkability might be out of scope for
> us, but we would need to describe the requirements for it.
>
> On Mon, Aug 3, 2020 at 5:16 PM Chelsea Komlo <chelsea.komlo@gmail.com>
> wrote:
>
>> Hi all,
>>
>> One question that has been raised is how clients can detect registry or
>> server misbehavior. One particular concern is the possibility that
>> registries or servers can perform targeted attacks by publishing different
>> keys to specific users without detection (resulting in a small anonymity
>> set).
>>
>> While client-side gossip protocols or use of anonymity networks give the
>> client an option to detect such targeted attacks, these options are not
>> necessarily generalizable.
>>
>> However, I think if we introduce the assumption that *at least one*
>> registry is acting honestly, then this problem may be easier to solve.
>>
>> Registries just need to add an additional capability to query other
>> registries on behalf of a client (if the client specifies this in their
>> request). In doing so, they can act as a one-hop proxy for the client. If
>> clients perform these requests periodically through a series of
>> randomly-chosen registries, they should eventually be able to detect
>> misbehavior, assuming one of the registries is acting honestly.
>>
>> Chris Wood pointed out to me that the above approach may have false
>> positives when a server rotates their key, so adding some kind of
>> "suspected" and "failed state" with retries might help get around such edge
>> cases.
>>
>> Thanks,
>> Chelsea
>> --
>> Privacy-pass mailing list
>> Privacy-pass@ietf.org
>> https://www.ietf.org/mailman/listinfo/privacy-pass
>>
> --
> Privacy-pass mailing list
> Privacy-pass@ietf.org
> https://www.ietf.org/mailman/listinfo/privacy-pass
>


-- 

Steven Valdez |  Chrome Privacy Sandbox |  svaldez@google.com |
 210-692-4742