Post on 27-Oct-2014
description
1
2
Introduction Nymble Properties The Nymble System Security Model Disadvantages Conclusion
3Nymble Blocking System
Anonymous network eg: Tor
IP hiding facilities Users misuses this network for abuse They deface popular websites Websites cannot blacklist individual malicious
users IP address They blacklist entire anonymizing network
4Nymble Blocking System
In pseudonymous credential systems Users are added to a blacklist This weakens the anonymity
In anonymous credential system Group signatures Lacks scalability
5Nymble Blocking System
Nymble is a system that allows websites to selectively blacklist users of anonymizing networks such as Tor without knowing the user's IP-address. Users not on the blacklist enjoy anonymity while blacklisted users are not allowed future connections for a duration of time while their previous connections remain unlinkable. Since Nymble allows websites to blacklist anonymious users of their choice, and since users are notified of their blacklist status, Nymble gives websites the power to define their own definition of "misbehavior"
Nymble Blocking System 6
Properties
Anonymous Authentication
Backward Unlinkability
Subjective Blacklisting
7Nymble Blocking System
Fast Authentication Speeds
Rate-Limited Anonymous Connections
Revocation Auditability
Sybil attack
Nymble Blocking System 8
In Nymble, users acquire an ordered collection of nymbles, a special type of pseudonym, to connect to Websites. Without additional information, these nymbles are computationally hard to link,4 and hence, using the stream of nymbles simulates anonymous access to services. Web sites, however, can blacklist users by obtaining a seed for a particular nymble, allowing them to link future nymbles from the same user—those used before the complaint remain unlinkable. Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously.
9Nymble Blocking System
10Nymble Blocking System
Fig. The Nymble system architecture showing the various modes of interaction
Resource-Based Blocking To limit the Sybil attack the Nymble
system binds nymbles to resources that are sufficiently difficult
to obtain in great numbers.
11Nymble Blocking System
The Pseudonym Manager The Nymble Manager Blacklisting a User
12Nymble Blocking System
13Nymble Blocking System
Notifying the User of Blacklist Status
14Nymble Blocking System
Nymble aims for four security goals. Blacklistability Rate-limiting assures Nonframeability Anonymity
15Nymble Blocking System
Nymble Blocking System 16
Nymble is comprehensive credential system. Add a layer of accountability to any publicly known
anonymizing network. Servers blacklist misbehaving users maintaining their
privacy. Increase the mainstream acceptance of anonymizing
network.
17Nymble Blocking System
www.wikipedia.com www.seminarprojects.com www.airccse.org www.torproject.org
18Nymble Blocking System
19Nymble Blocking System
20
Nymble Blocking System
Nymble Blocking System 21
System Setup
ServerRegistration
BlacklistUpdateAndComplaining
Tor