1
 Introduction
 Nymble
 Properties
 System Architecture
 Security Model
 Limitations
 Conclusion

                 Nymble Blocking System   3
   Anonymous network
      o IP hiding facilities
      o Polipo, Tor, USAIP
 Users misuses this network for abuse
 They deface popular websites
 Websites cannot blacklist individual IP
  address
 They blacklist entire anonymizing network



                    Nymble Blocking System   4
 In   pseudonymous credential systems
       Users are added to a blacklist
       Weak in anonymity

 In   anonymous credential system
       Group signatures
       Lacks scalability



                  Nymble Blocking System   5
 A system that allows websites to selectively
  blacklist users of anonymizing networks.
 Blocks user without user's IP-address.
 Legitimate users enjoy anonymity.
 Blacklisted users got blocked for future
  connections.
 Previous connections remain unlinkable.



               Nymble Blocking System      6
 Anonymous Authentication


 Backward     Unlinkability

 Subjective   Blacklisting


               Nymble Blocking System   7
 Fast Authentication                 Speeds

 Rate-Limited Anonymous                   Connections

 Revocation Auditability



             Nymble Blocking System                8
   User

   The Pseudonym Manager

   The Nymble Manager

   Server

             Nymble Blocking System   9
Fig. The Nymble system architecture showing the various modes of interaction

                       Nymble Blocking System                                  10
Fig: The Nymble system architecture showing how a user is blacklisted
                     Nymble Blocking System                             11
Nymble Blocking System   12
Aims four security goals


 Blacklistability

 Rate-limiting assures

 Nonframeability

 Anonymity

               Nymble Blocking System   13
 Sybil attack
 Mimics IP based blocking
 Availability of multiple IP address helps
  users circumvent the system




             Nymble Blocking System   14
 Nymble is comprehensive credential system.
 Add a layer of accountability to any publicly known
  anonymizing network.
 Servers blacklist misbehaving users maintaining their
  privacy.
 Increase the mainstream acceptance of anonymizing
  network.




                 Nymble Blocking System         15
 www.airccse.org
 www.torproject.org
 www.sciencedirect.com
 www.wikipedia.com




              Nymble Blocking System
                                       16
Nymble Blocking System
                         17
Nymble: Blocking System

Nymble: Blocking System

  • 1.
  • 3.
     Introduction  Nymble Properties  System Architecture  Security Model  Limitations  Conclusion Nymble Blocking System 3
  • 4.
    Anonymous network o IP hiding facilities o Polipo, Tor, USAIP  Users misuses this network for abuse  They deface popular websites  Websites cannot blacklist individual IP address  They blacklist entire anonymizing network Nymble Blocking System 4
  • 5.
     In pseudonymous credential systems Users are added to a blacklist Weak in anonymity  In anonymous credential system Group signatures Lacks scalability Nymble Blocking System 5
  • 6.
     A systemthat allows websites to selectively blacklist users of anonymizing networks.  Blocks user without user's IP-address.  Legitimate users enjoy anonymity.  Blacklisted users got blocked for future connections.  Previous connections remain unlinkable. Nymble Blocking System 6
  • 7.
     Anonymous Authentication Backward Unlinkability  Subjective Blacklisting Nymble Blocking System 7
  • 8.
     Fast Authentication Speeds  Rate-Limited Anonymous Connections  Revocation Auditability Nymble Blocking System 8
  • 9.
    User  The Pseudonym Manager  The Nymble Manager  Server Nymble Blocking System 9
  • 10.
    Fig. The Nymblesystem architecture showing the various modes of interaction Nymble Blocking System 10
  • 11.
    Fig: The Nymblesystem architecture showing how a user is blacklisted Nymble Blocking System 11
  • 12.
  • 13.
    Aims four securitygoals  Blacklistability  Rate-limiting assures  Nonframeability  Anonymity Nymble Blocking System 13
  • 14.
     Sybil attack Mimics IP based blocking  Availability of multiple IP address helps users circumvent the system Nymble Blocking System 14
  • 15.
     Nymble iscomprehensive credential system.  Add a layer of accountability to any publicly known anonymizing network.  Servers blacklist misbehaving users maintaining their privacy.  Increase the mainstream acceptance of anonymizing network. Nymble Blocking System 15
  • 16.
     www.airccse.org  www.torproject.org www.sciencedirect.com  www.wikipedia.com Nymble Blocking System 16
  • 17.