Privacy Pass: Bypassing Internet Challenges Anonymously

Abstract The growth of content delivery networks (CDNs) has engendered centralized control over the serving of internet content. An unwanted by-product of this growth is that CDNs are fast becoming global arbiters for which content requests are allowed and which are blocked in an attempt to stanch malicious traffic. In particular, in some cases honest users-especially those behind shared IP addresses, including users of privacy tools such as Tor, VPNs, and I2P - can be unfairly targeted by attempted ‘catch-all solutions’ that assume these users are acting maliciously. In this work, we provide a solution to prevent users from being exposed to a disproportionate amount of internet challenges such as CAPTCHAs. These challenges are at the very least annoying and at their worst - when coupled with bad implementations - can completely block access from web resources. We detail a 1-RTT cryptographic protocol (based on an implementation of an oblivious pseudorandom function) that allows users to receive a significant amount of anonymous tokens for each challenge solution that they provide. These tokens can be exchanged in the future for access without having to interact with a challenge. We have implemented our initial solution in a browser extension named “Privacy Pass”, and have worked with the Cloudflare CDN to deploy compatible server-side components in their infrastructure. However, we envisage that our solution could be used more generally for many applications where anonymous and honest access can be granted (e.g., anonymous wiki editing). The anonymity guarantee of our solution makes it immediately appropriate for use by users of Tor/VPNs/ I2P. We also publish figures from Cloudflare indicating the potential impact from the global release of Privacy Pass.

[1]  Amit Sahai,et al.  Round Optimal Blind Signatures , 2011, CRYPTO.

[2]  Jacques Stern,et al.  Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.

[3]  Sanjam Garg,et al.  Efficient Round Optimal Blind Signatures , 2014, IACR Cryptol. ePrint Arch..

[4]  Ian Goldberg,et al.  Extending Nymble-like Systems , 2011, 2011 IEEE Symposium on Security and Privacy.

[5]  Florian Kerschbaum,et al.  Privacy-preserving billing for e-ticketing systems in public transportation , 2013, IACR Cryptol. ePrint Arch..

[6]  Daniel Moore,et al.  EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves , 2017, IACR Cryptol. ePrint Arch..

[7]  Nicholas Hopper,et al.  BNymble: More Anonymous Blacklisting at Almost No Cost (A Short Paper) , 2011, Financial Cryptography.

[8]  Ahmad-Reza Sadeghi,et al.  User Privacy in Transport Systems Based on RFID E-Tickets , 2008, PiLBA.

[9]  Aggelos Kiayias,et al.  Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online) , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[10]  David Chaum,et al.  Blind Signature System , 1983, CRYPTO.

[11]  David Chaum,et al.  Wallet Databases with Observers , 1992, CRYPTO.

[12]  Aggelos Kiayias,et al.  Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model , 2014, ASIACRYPT.

[13]  Prateek Mittal,et al.  TorPolice: Towards Enforcing Service-Defined Access Policies in Anonymous Systems , 2017, ArXiv.

[14]  Moni Naor,et al.  Can NSEC5 be practical for DNSSEC deployments? , 2017, IACR Cryptol. ePrint Arch..

[15]  Markus Jakobsson,et al.  Security of Signed ElGamal Encryption , 2000, ASIACRYPT.

[16]  Georg Fuchsbauer,et al.  Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions , 2016, IACR Cryptol. ePrint Arch..

[17]  Ryan Henry,et al.  Efficient Zero-Knowledge Proofs and Applications , 2014 .

[18]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[19]  Kevin Fu,et al.  Privacy for Public Transportation , 2006, Privacy Enhancing Technologies.

[20]  C. P. Schnorr,et al.  Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.

[21]  Christian Grothoff,et al.  GNU Taler: Ethical Online Payments for the Internet Age , 2016, ERCIM News.

[22]  Ian Goldberg,et al.  Formalizing Anonymous Blacklisting Systems , 2011, 2011 IEEE Symposium on Security and Privacy.

[23]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[24]  Ian Goldberg,et al.  Batch Proofs of Partial Knowledge , 2013, ACNS.

[25]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[26]  Markus Rückert,et al.  Lattice-based Blind Signatures , 2010, Algorithms and Number Theory.