This has been suggested a few times but there were various worries. I
think the following is the most coherent proposal evolution so far:

Freenet: Tor first hop:
- Different protocol, TCP based. Don't need transport plugins.
-- "Do requests/inserts" - closer to client layer, not FNP. May return
new gateway nodes too, via path folding.
- Gateway nodes are not anonymous.
-- Even if we tried to make them anonymous, they'd have normal
connections, could start a request through a tunnel and trace it.
-- Having all connections over Tor would be way too slow and upset Tor
people too.
- Advertise in noderef, proxy.tor=... [ NOTE NOT physical.tor=... !! ]
-- Client nodes only accept proxy.tor= entries through tunnels, not from
direct connections.
-- But they DO relay them.
-- Hence need some initial "anonymous seeds".
-- Note: Capture is possible because of this, countermeasures maybe
similar to opennet seed capture...
- Which requests use which tunnel?
-- Long term issue, will want to label traffic generators / FCP clients
/ etc.

Downsides:
- Cheap denial of service attacks. Asymmetrical. Maybe we could make it
bandwidth-symmetrical, e.g. by requiring bogus data transfers to balance
both directions, but is that enough?
- Tor is much more likely to be blocked than Freenet. :(

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
[email protected]
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to