So there is a potential threat against opennet that we need to think about
how we can either address or mitigate, hopefully without making Freenet's
performance any worse.

I call it the Barlow attack, because I've noticed that John Perry Barlow
seems to be connected to everyone I know on various social networking
websites :-)

The attack is two-stage:

1) The attacker attempts to connect to as many opennet peers as possible,
and maintain open connections to them.  It does this by announcing a lot,
accepting as many connections as possible, and trying to respond to requests
promptly with a good success rate so that peers stay connected.  The
attacker may do this using a number of nodes

The attacker records the key of every single insert and request coming from
every peer.

2) Then, let's say that someone uploads a large file, and the attacker would
like to find the uploader.  They simply look at all the pieces of this
insert, and identify the peer from which most of these originated.  If they
happen to have a connection to the uploader, then there is a decent chance
that this peer is the original inserter.

We can make this attack more difficult by thwarting either or both of these
stages, or at least making them more difficult.

For example, we could make 1) more difficult if, any time we see two peers
in the came class-B address range, we disconnect from both of them, or at
least never route anything to either of them.

It may not be possible to completely prevent this attack, which is why we do
encourage people to use darknet mode as soon as they are able, particularly
if they have legitimate cause for concern.

Thoughts?

Ian.

-- 
Ian Clarke
CEO, SenseArray
Email: ian at sensearray.com
Ph: +1 512 422 3588
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20101202/a1474261/attachment.html>

Reply via email to