For the record- I still think that reducing the initial connection to 
"IP:Port and Password", rather than having to exchange a noderef will 
signing your friends up much easier, and make people more likely to use 
the darknet ;)

-Colin



Colin Davis wrote:
> Fair enough-
> 
> 
> I (mis)understood the problem as wanting to make it possible to add the 
> connections without requiring file-transfers.. I didn't realize that you 
> were trying to avoid having to download the binary from a central source.
> 
> For that, I agree, burnable .zips, and .5-style distribution servlet 
> pages are likely the best that can be done.
> 
> -Colin
> 
> 
> 
> 
> 
> 
> NextGen$ wrote:
>> * Colin Davis <Colin at sq7.org> [2007-03-05 15:49:17]:
>>
>>> I'm sorry that I'm being dim-
>>> Could you please explain how the network topography is exposed? I'm sure 
>>> you're right, I'm just missing it.
>> Well, your solution is about shortening the reference. I thought you were
>> trying to address the node installation/deployment problem without emu/the
>> mirroring system.
>>
>> NextGen$
>>
>>>
>>>
>>>
>>> If we have two clients, A and B, who want to talk to one another.. Both 
>>> are behind Firewalls..
>>>
>>> * A calls up B, and tells him "Connect to me, at 11.22.33.44, password 
>>> 'Bob is a super cool password'"
>>>
>>> * B Says sure, and clicks the "Connect to a new client" icon in Fred, 
>>> enters the IP and Password.
>>>
>>> * B's machine starts sending Freenet packets to A, thus opening up a NAT 
>>> hole to his machine through the UDP trick.
>>>
>>> * B then tells A "It's running! Add my computer back. Mine is 
>>> 22.33.44.55, and the password is 'Donkeys are really cool, and I like 
>>> the way they look' "
>>>
>>> * A adds B's IP and password, and starts sending freenet packets to B.
>>> * A's machine is now exposed, through the UDP trick.
>>>
>>> * B's packets, which he is still sending, get through.
>>> * A's packets get through to B.
>>>
>>> * Now that they're talking, they exchange signed keys (real noderefs), 
>>> so next time, they don't need to do the passwords.
>>>
>>> * Fred disables the passwords.
>>>
>>> Nothing has required the use of a third party, other than the telephone 
>>> call between the two of them to share the passwords.
>>>
>>> -Colin
>>>
>>>
>>>
>>>
>>>>> When Side-A added the noderef of B, it would start sending out packets 
>>>>> to B, knowing that they won't get returned.. But the Sending of these 
>>>>> packets would open a NAT-hole..
>>>>> Then, Side-B would get around to adding the noderef of A, and start 
>>>>> sending packets to A, opening a NAT-hole on their own side.. Side A's 
>>>>> packets then get in through this hole, just as B's now arrive at A.
>>>>>
>>>>> What am I missing?
>>>>>
>>>>> -Colin
>>> _______________________________________________
>>> Tech mailing list
>>> Tech at freenetproject.org
>>> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
>> _______________________________________________
>> Tech mailing list
>> Tech at freenetproject.org
>> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> 
> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech


Reply via email to