This has been suggested a few times but there were various worries. I think the following is the most coherent proposal evolution so far:
Freenet: Tor first hop: - Different protocol, TCP based. Don't need transport plugins. -- "Do requests/inserts" - closer to client layer, not FNP. May return new gateway nodes too, via path folding. - Gateway nodes are not anonymous. -- Even if we tried to make them anonymous, they'd have normal connections, could start a request through a tunnel and trace it. -- Having all connections over Tor would be way too slow and upset Tor people too. - Advertise in noderef, proxy.tor=... [ NOTE NOT physical.tor=... !! ] -- Client nodes only accept proxy.tor= entries through tunnels, not from direct connections. -- But they DO relay them. -- Hence need some initial "anonymous seeds". -- Note: Capture is possible because of this, countermeasures maybe similar to opennet seed capture... - Which requests use which tunnel? -- Long term issue, will want to label traffic generators / FCP clients / etc. Downsides: - Cheap denial of service attacks. Asymmetrical. Maybe we could make it bandwidth-symmetrical, e.g. by requiring bogus data transfers to balance both directions, but is that enough? - Tor is much more likely to be blocked than Freenet. :(
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Devl mailing list [email protected] https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
