[freenet-support] "BitTorrent"

2007-03-16 Thread inverse
> Freenet has a thing called a 'datastore'. Every node (user) of Freenet 
> dedicates some

talking about the datastore, if Freenet hasn't modified its behaviour
lately I recall the every stored key is bound to disappear sooner or
later from all the datastores.

This is good when seen a wise usage of available space, and this is
similar to the way bittorrent works (unpopulated torrents eventually
are bound to disappear).

However this is an undesirable behaviour to those looking for rare stuff.

The reason for these ramblings is as follows. In a single week two of
my older HDs have started  showing signs of death. This is bad. I had
to buy bigger a fat new HD to backup the data.
Imagine what would happen if a big HD suddenly fails?

Personally I don't have the money to buy a tape streamer or to
completely mirror my data. Burning DVDs is not a viable option: DVD
are prone to fast deterioration as time passes, plus they are
remarkably small, compared to a modern Hard Disk.

Now, what would happen if key are never bound to expire in a freenet datastore?
Then you would have a permanent remote backup of your precious data.
A darknet could be made to work as a remarkable distributed and (not
so strongly) encrypted multiuser network backup system.
If I recall correctly, the datastore size determines when a key is
about to expire. Given that I'm willing to dedicate a full encrypted
HD as a datastore, I'd like to suggest the possibility of a Freenet
branch with the option to disable key expiration and to stop storing
keys when the datastore is full.

sorry for the dumb request..

bye
Inverse



[freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-31 Thread inverse
Matthew Toseland wrote:

> It's unnecessary anyway because it only applies to TCP. It does however
> tell us something very interesting and useful: The firewall is stateless !!
heh, it would be damn expensive to do that in a stateful way.

let's see:

>1. Timing.
>2. Packet size.
>3. It's not a known protocol, therefore it must be bad.
>4. Flow analysis.

either way it might be too expensive or require a stateful filter





[freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-31 Thread inverse
urza9814 at gmail.com wrote:
> Have you thought about that ignoring reset packets thing that was
> shown to make it possible to bypass The Great Firewall? I mean, I
> don't know too much about it, or if it'd be possible for
> freenetbut it might be worth looking in to. 

it's possible to do it, but only under linux at the moment.

You just set an iptables prerouting rule that drops incoming tcp RST 
packets.
This a kernel side level 4 setting that's perfectly transparent to the 
application level, the only side effect being that any incoming 
connection will end with a timeout in place of a graceful reset.
Under windows I suppose you simply lack the instruments and support to 
do something clever like that.





[freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-31 Thread inverse
David 'Bombe' Roden wrote:

> Communication between 0.7 nodes doesn't have to exchange public keys, 
> those are already known as they are contained in the node reference.
nice!

I definitely need to install 0.7 and capture some packets for testing




Re: [freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-31 Thread inverse

Matthew Toseland wrote:


It's unnecessary anyway because it only applies to TCP. It does however
tell us something very interesting and useful: The firewall is stateless !!

heh, it would be damn expensive to do that in a stateful way.

let's see:


1. Timing.
2. Packet size.
3. It's not a known protocol, therefore it must be bad.
4. Flow analysis.


either way it might be too expensive or require a stateful filter


___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]


[freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-30 Thread inverse
Matthew Toseland wrote:
> Well on the most trivial level, 0.5 doesn't work in china.
>   
yo,

beyond harvesting the connected IP addresses to raid their owner's 
homes, one big concern with encrypted protocols is that they can be 
filtered out by application-level scanning firewalls. I think this is 
exactly what's happening in China.


Application-level scanning can be implemented via ASIC technology 
directly in hardware thus being extremely fast, and we know this works 
very well.
Public-key encrypted communications show constant patterns the moment a 
public key is exchanged between hosts.

Such system can work until there's enough processing power available to 
make them run without compromising the overal network performance, so to 
defeat them (they are intended to simply drop forbidden connections) you 
have to design a protocol
which shows no recognisable patterns at any level.
Nested symmetric encryption of each packet with multiple randomly 
selected pre-shared keys?
To decode each packet a firewall will have to:
1) try at least half the known pre-shared keys on each packet
2) do the above for each level of encryption used.

given the number of keys n and the number of levels l the total number 
of decryption passes k before you extract usable data (which may be 
further asymmetrically encrypted)  is  k = (n/2)^l. This is true for 
each packet and you cannot avoid doing this if you want to confirm the 
contents.
While this might not be so demanding for a single CPU and few 
connections, a core firewall won't be happy to discover that a simple 
scan no longer suffices and you have to actually process a VERY large 
number of packets coming from a number of sources with random ports 
trough a custom designed and frequently updated cryptographic ASIC 
multiple times.

The idea is not to design a virtually unstopplable protocol:  there  
might come a day when only  pure HTTP  to port 80 is  allowed,  the idea 
instead is to make it a bit more unstoppable in places like China, 
probably France and EU and next in the US.

Also, this won't be a solution in places that trace social network 
connections (like the current US), this  however will make  the process 
somewhat harder.

Just a suggestion..







Re: [freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-30 Thread inverse

Matthew Toseland wrote:

Well on the most trivial level, 0.5 doesn't work in china.
  

yo,

beyond harvesting the connected IP addresses to raid their owner's 
homes, one big concern with encrypted protocols is that they can be 
filtered out by application-level scanning firewalls. I think this is 
exactly what's happening in China.



Application-level scanning can be implemented via ASIC technology 
directly in hardware thus being extremely fast, and we know this works 
very well.
Public-key encrypted communications show constant patterns the moment a 
public key is exchanged between hosts.


Such system can work until there's enough processing power available to 
make them run without compromising the overal network performance, so to 
defeat them (they are intended to simply drop forbidden connections) you 
have to design a protocol

which shows no recognisable patterns at any level.
Nested symmetric encryption of each packet with multiple randomly 
selected pre-shared keys?

To decode each packet a firewall will have to:
1) try at least half the known pre-shared keys on each packet
2) do the above for each level of encryption used.

given the number of keys n and the number of levels l the total number 
of decryption passes k before you extract usable data (which may be 
further asymmetrically encrypted)  is  k = (n/2)^l. This is true for 
each packet and you cannot avoid doing this if you want to confirm the 
contents.
While this might not be so demanding for a single CPU and few 
connections, a core firewall won't be happy to discover that a simple 
scan no longer suffices and you have to actually process a VERY large 
number of packets coming from a number of sources with random ports 
trough a custom designed and frequently updated cryptographic ASIC 
multiple times.


The idea is not to design a virtually unstopplable protocol:  there  
might come a day when only  pure HTTP  to port 80 is  allowed,  the idea 
instead is to make it a bit more unstoppable in places like China, 
probably France and EU and next in the US.


Also, this won't be a solution in places that trace social network 
connections (like the current US), this  however will make  the process 
somewhat harder.


Just a suggestion..




___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]


Re: [freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-30 Thread inverse

David 'Bombe' Roden wrote:

Communication between 0.7 nodes doesn't have to exchange public keys, 
those are already known as they are contained in the node reference.

nice!

I definitely need to install 0.7 and capture some packets for testing

___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]


Re: [freenet-chat] Re: [freenet-support] Freenet 0.7

2006-08-30 Thread inverse

[EMAIL PROTECTED] wrote:

Have you thought about that ignoring reset packets thing that was
shown to make it possible to bypass The Great Firewall? I mean, I
don't know too much about it, or if it'd be possible for
freenetbut it might be worth looking in to. 


it's possible to do it, but only under linux at the moment.

You just set an iptables prerouting rule that drops incoming tcp RST 
packets.
This a kernel side level 4 setting that's perfectly transparent to the 
application level, the only side effect being that any incoming 
connection will end with a timeout in place of a graceful reset.
Under windows I suppose you simply lack the instruments and support to 
do something clever like that.



___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]


[freenet-support] Freenet 0,5 and 0,7

2006-08-29 Thread inverse
nobody at geonosis.homelinux.net wrote:

> Please, Do NOT suggest switching to Linux, I've tried it and my hardware will 
> not support it's demands.  Again, this is a matter of money that unlike SOME 
> people, I don't have a hell
>   
I suggest linux. There are many versions of it, some of them designed to 
run on very poor hardware with insufficient ram.
Money is not an excuse for using a bad OS.

Just look for a minimalist linux. There are many good window managers 
like IceWM (IIRC) which won't demand much memory.




Re: [freenet-support] Freenet 0,5 and 0,7

2006-08-29 Thread inverse

[EMAIL PROTECTED] wrote:


Please, Do NOT suggest switching to Linux, I've tried it and my hardware will 
not support it's demands.  Again, this is a matter of money that unlike SOME 
people, I don't have a hell
  
I suggest linux. There are many versions of it, some of them designed to 
run on very poor hardware with insufficient ram.

Money is not an excuse for using a bad OS.

Just look for a minimalist linux. There are many good window managers 
like IceWM (IIRC) which won't demand much memory.


___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]


Re: [freenet-support] datastore out of control

2002-12-22 Thread inverse
5tucatz elPunishar wrote:




is there anything i can do ?
i already tried deleting the datastore.. doesn't help. 



amazing.

Looks like your HD got datastore-cancer.

It's gonna explode, no matter what you can do.



___
support mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/support



Re: [freenet-support] Fw: LoveGangs relations to see !

2002-11-04 Thread inverse
Moro Beatrice wrote:

Moro Beatrice?

Buy yourself a better antivirus software.








___
support mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/support



Re: [freenet-support]

2002-10-11 Thread inverse

MA wrote:

 ÄúºÃ£º

ÖйúÈË£¿







___
support mailing list
[EMAIL PROTECTED]
http://hawk.freenetproject.org/cgi-bin/mailman/listinfo/support