On 07/01/14 17:00, Ian Clarke wrote:
> It's not really clear what you are proposing here, what is the context?
We should allow, optionally, tunneling the first hop over Tor or I2P. Hence:
- We implement a simple binary protocol over TCP.
- Nodes can optionally expose this for "transient" clients.
- We provide some way to find nodes exposing this service within Tor to
connect to, possibly via a flag in the Tor router directory or some
other mechanism.
- We provide an option for a real node to route all locally originated
requests via tunneled nodes exposing this service.

Right now Freenet provides a distributed, mostly censorship resistant
datastore (an important service that Tor doesn't provide, potentially
enabling services that are more robust than Tor hidden servers), but
only a limited degree of anonymity. IMHO for good security Freenet needs
to tunnel the first hop (before we start routing properly) over a
mixnet. The easy, plug and play, and still somewhat decentralised,
solution is to go via Tor.

In the long run, I would like Freenet to construct its own tunnels, over
a darknet social network via the PISCES algorithm; this would be
substantially more secure than Tor is at present (as it is resistant to
Sybil attacks and can even use high latency for uploads) but it is a
long way off for various reasons (we'd need a darknet, but also it's a
lot of work and needs other stuff too; also there are tricky
invisibility/tunnel length tradeoffs).
> Ian.
>
>
> On Tue, Jan 7, 2014 at 5:36 AM, Matthew Toseland
> <t...@amphibian.dyndns.org>wrote:
>
>> The leaked files on Tor suggest it is significantly stronger than at
>> least I had assumed.
>>
>> It might be interesting to create a simple, but cryptographically
>> verified, TCP-based protocol for communicating with gateways through
>> tunnels, to protect the first hop. This would be a "transient"
>> request/response protocol handling binary blobs; clients would route the
>> first hop (at least on opennet) through these tunnels, verify returned
>> content, and possibly label requests to keep them on separate tunnels.
>>
>> On darknet we will eventually protect the first hop via PISCES tunnels,
>> however IMHO this is some way off and there are (probably) very few
>> darknet users at present.
>>
>> We could then ask Tor for a directory server flag, although they might
>> say no if Freenet is seen as "filesharing" and therefore obnoxious.
>>
>> DoS issues might result in some servers asking for payment, although
>> creating a business model is often a good way to fund your attackers
>> (especially if the gateways are anonymised); this is why a classic
>> mixnet doesn't work for bitcoin, for example (don't trust anything
>> without provable blinding).
>>
>> tgs3 and various people on Frost have been suggesting this for some time.
>>
>> IMHO Tor is preferable to I2P (assuming the NSA stuff isn't a false
>> trail, which it might be), but it could work with either.
>>
>> Arguably we should use a normal transport, we're some way away from
>> having TCP-based transport plugins though... and this could be a fairly
>> simple protocol, we can transfer a single block (key) at a time as a
>> single message.
>>
>>
>> http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to