On Monday 22 Jul 2013 18:08:57 Matthew Toseland wrote:
> On Monday 22 Jul 2013 16:57:35 Ian Clarke wrote:
> > On Mon, Jul 22, 2013 at 9:32 AM, Matthew Toseland <[email protected]
> > > wrote:
> > 
> > > Since Eleriseth announced he was leaving and we should focus on
> > > speed/usability, then opennet security, and only then darknet, I have been
> > > looking into options for securing opennet, and discussing this with 
> > > various
> > > people.
> > 
> > I agree that speed/usability should be the top priority (although obviously
> > not the only priority).  
> 
> There is plenty we can do to improve both. Including on darknet.
> 
> > Most of the proposals below are directly contrary
> > to usability - we need to encourage people to contribute to the Freenet
> > network, not punish them for it, nor make them jump through unnecessary
> > hoops.  We need to find solutions that won't make it even more difficult to
> > contribute to the Freenet network.
> 
> There are none IMHO. Our options for significantly better security are either:
> 1) Make darknet easy and fast, and hope it doesn't take the rest of the 
> century to reach critical mass, or
> 2) Make opennet secure (meaning considerably less easy)
> > 
> > The main attacks here are:
> > > - MAST: Listen for a predictable request/insert, triangulate roughly where
> > > the originator is on the network based on the requests you receive,
> > > announce to that location, repeat until you have the target. Cheap. 
> > > Really,
> > > really cheap.
> > 
> > To the extent that this is feasible, routing a request randomly on its
> > initial hop, perhaps with a bias towards nodes that are further from your
> > node's location, should make this considerably more difficult.
> 
> We can route randomly for several hops, with only minimal performance impact 
> (especially on inserts). We can bundle a bunch of related inserts together 
> and route them as a block for several random hops. Combined with some means 
> to make it hard to choose locations to announce to, this makes MAST somewhat 
> harder. But it has no effect on the second attack.

Correction, the "bundling" thing does help with the second attack, but it 
likely has performance implications if we use it for large inserts. If we only 
use it for the top block then it has no benefit against connect-to-everyone.

Likewise, full blown tunneling but only for the top keys has no effect against 
connect-to-everyone - even if the tunnels aren't compromised, which they would 
be on opennet because the attacker can control the keyspace, dominate any 
targeted node's connections, do tagging attacks and so on.

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Devl mailing list
[email protected]
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to