Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread Paul Crowley

AARG!Anonymous [EMAIL PROTECTED] writes:

 Be sure and send a note to the Gnutella people reminding them of all
 you're doing for them, okay, Lucky?

Do the Gnutella people share your feelings on this matter?  I'd be
surprised.
-- 
  __  Paul Crowley
\/ o\ [EMAIL PROTECTED]
/\__/ http://www.ciphergoth.org/

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread R. A. Hettinga

I'm genuinely sorry, but I couldn't resist this...

At 12:35 PM -0400 on 8/11/02, Sean Smith wrote:


 Actually, our group at Dartmouth has an NSF Trusted Computing
 grant to do this, using the IBM 4758 (probably with a different
 OS) as the hardware.

 We've been calling the project Marianas, since it involves a
 chain of islands.

...and not the world's deepest hole, sitting right next door?

;-)

Cheers,
RAH



 --Sean

If only there were a technology in which clients could verify and
yes, even trust, each other remotely.  Some way in which a digital
certificate on a program could actually be verified, perhaps by
some kind of remote, trusted hardware device.  This way you could
know that a remote system was actually running a well-behaved
client before admitting it to the net. This would protect Gnutella
from not only the kind of opportunistic misbehavior seen today, but
the future floods, attacks and DOSing which will be launched in
earnest once the content companies get serious about taking this
network down.


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-11 Thread Sean Smith


i guess it's appropriate that the world's deepest
hole is next to something labelled a trust territory :)

--Sean

:)











-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



p2p DoS resistance and network stability (Re: Thanks, Lucky, for helping to kill gnutella)

2002-08-10 Thread Adam Back

On Fri, Aug 09, 2002 at 08:25:40PM -0700, AARG!Anonymous wrote:
 Several people have objected to my point about the anti-TCPA efforts of
 Lucky and others causing harm to P2P applications like Gnutella.

The point that a number of people made is that what is said in the
article is not workable: clearly you can't ultimately exclude chosen
clients on open computers due to reverse-engineering.

(With TCPA/Palladium remote attestation you probably could so exclude
competing clients, but this wasn't what was being talked about).

The client exclusion plan is also particularly unworkable for gnutella
because some of the clients are open-source, and the protocol is (now
since original reverse engineering from nullsoft client) also open.

With closed-source implementations there is some obfuscation barrier
that can be made: Kazaa/Morpheus did succeed in frustrating competing
clients due to it's closed protocols and unpublished encryption
algorithm.  At one point an open source group reverse-engineered the
encryption algorithm, and from there the contained kazaa protocols,
and built an interoperable open-source client giFT
http://gift.sourceforge.net, but then FastTrack promptly changed the
unpublished encryption algorithm to another one and then used remote
code upgrade ability to upgrade all of the clients.

Now the open-source group could counter-strike if they had
particularly felt motivated to.  For example they could (1)
reverse-engineer the new unpublished encryption algorithm, and (2) the
remote code upgrade, and then (3) do their own forced upgrade to an
open encryption algorithm and (4) disable further forced upgrades.

(giFT instead after the ugrade attack from FastTrack decided to
implement their own open protocol openFT instead and compete.  It
also includes a general bridge between different file-sharing
networks, in a somewhat gaim like way, if you are familiar with
gaim.)

 [Freenet and Mojo melt-downs/failures...] Both of these are object
 lessons in the difficulties of successful P2P networking in the face
 of arbitrary client attacks.

I grant you that making simultaneously DoS resistant, scalable and
anonymous peer-to-peer networks is a Hard Problem.  Even removing the
anonymous part it's still a Hard Problem.

Note both Freenet and Mojo try to tackle the harder of those two
problems and have aspects of publisher and reader anonymity, so that
they are doing less well than Kazaa, gnutella and others is partly
because they are more ambitious and tackling a harder problem.  Also
the anonymity aspect possibly makes abuse more likely -- ie the
attacker is provided as part of the system tools to obscure his own
identity in attacking the system.  DoSers of Kazaa or gnutella would
likely be more easily identified which is some deterrence.

I also agree that the TCPA/Palladium attested closed world computing
model could likely more simply address some of these problems.

(Lucky slide critique in another post).

Adam
--
http://www.cypherspace.org/adam/

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-10 Thread Seth Johnson


TCPA and Palladium are content control for the masses.  They
are an attempt to encourage the public to confuse the public
interest issues of content control with the private interest
issues of privacy and security.

Seth Johnson

-- 

[CC] Counter-copyright:
http://cyber.law.harvard.edu/cc/cc.html

I reserve no rights restricting copying, modification or
distribution of this incidentally recorded communication. 
Original authorship should be attributed reasonably, but
only so far as such an expectation might hold for usual
practice in ordinary social discourse to which one holds no
claim of exclusive rights.


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-10 Thread R. Hirschfeld

 Date: Fri, 9 Aug 2002 20:25:40 -0700
 From: AARG!Anonymous [EMAIL PROTECTED]

 Right, as if my normal style has been so effective.  Not one person has
 given me the least support in my efforts to explain the truth about TCPA
 and Palladium.

Hal, I think you were right on when you wrote:

  But feel free to make
  whatever assumptions you like about my motives.  All I ask is that you
  respond to my facts.

I, for one, support your efforts, even though I don't agree with some
of your conclusions.  It is clear that you hold a firm opinion that
differs from what many others here believe, so in making your points
you can expect objections to be raised.  You will be more convincing
(at least to me) if you continue to respond to these dispassionately
on the basis of facts and reasoned opinions (your normal style?).
Calling Lucky a liar is no more illuminating than others calling you
an idiot.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-10 Thread Nelson Minar

Wow, this conversation has been fun. Thanks, Anonymous Aarg, for
taking up the unpopular side of the debate. I'll spare any question
about motives.

I think most of us would agree that having a trusted computing
environment makes some interesting things possible. Smartcards,
afterall, are more or less the same idea as Palladium, just on a
smaller scale. You're right to point out they could make things like a
trusted Gnutella client possible, or do SETI@Home style distributed
computing in a secure manner, or...

But the context of Palladium is larger than what a few smart P2P folks
could do. Palladium is a technology proposed by a convicted predatory
monopolist. It is a technology that gives that monopolist even more
control over the uses of its technology. And it just so happens to be
exactly in line with the needs of the entertainment industry which has
spent the past few years doing their best to squelch creative uses of
the Internet so they can jealously protect their copyright hegemony.

We'd be crazy not to be a little concerned.

Let's turn the debate to a slightly more interesting place. Is there a
way to create a trusted computing environment such as Palladium that
does not also enable the restrictionof liberties? The optional
aspect of Palladium isn't enough - the folks who own the media will
ensure that it can only be played if your computer is in trusted mode.

 [EMAIL PROTECTED]
.   .  . ..   .  . . http://www.media.mit.edu/~nelson/

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-10 Thread Pete Chown

Anonymous wrote:

 As far as Freenet and MojoNation, we all know that the latter shut down,
 probably in part because the attempted traffic-control mechanisms made
 the whole network so unwieldy that it never worked.

Right, so let's solve this problem.  Palladium/TCPA solves the problem
in one sense, but in a very inconvenient way.  First of all, they stop
you running a client which has been modified in any way -- not just a
client which has been modified to be selfish.  Secondly, they facilitate
the other bad things which have been raised on this list.

 Right, as if my normal style has been so effective.  Not one person has
 given me the least support in my efforts to explain the truth about TCPA
 and Palladium.

The reason for that is that we all disagree with you.  I'm interested to
read your opinions, but I will argue against you.  I'm not interested in
reading flames at all.

-- 
Pete

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-10 Thread Jeroen C . van Gelderen


On Friday, Aug 9, 2002, at 13:05 US/Eastern, AARG!Anonymous wrote:
 If only...  Luckily the cypherpunks are doing all they can to make sure
 that no such technology ever exists.  They will protect us from being 
 able
 to extend trust across the network.  They will make sure that any open
 network like Gnutella must forever face the challenge of rogue clients.
 They will make sure that open source systems are especially vulnerable
 to rogues, helping to drive these projects into closed source form.

This argument is a straw man but to be fair: I am looking forward to 
your detailed proof that the only way to protect a Gnutella-like 
network from rogue clients is a Palladium-like system. You are so 
adamant that I have to assume you have such proof sitting right on your 
desk. Please share it with us.

-J


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-09 Thread Bram Cohen

AARG!Anonymous wrote:

 If only there were a technology in which clients could verify and yes,
 even trust, each other remotely.  Some way in which a digital certificate
 on a program could actually be verified, perhaps by some kind of remote,
 trusted hardware device.  This way you could know that a remote system was
 actually running a well-behaved client before admitting it to the net.
 This would protect Gnutella from not only the kind of opportunistic
 misbehavior seen today, but the future floods, attacks and DOSing which
 will be launched in earnest once the content companies get serious about
 taking this network down.

Before claiming that the TCPA, which is from a deployment standpoint
vaporware, could help with gnutella's scaling problems, you should
probably learn something about what gnutella's problems are first. The
truth is that gnutella's problems are mostly that it's a screamer
protocol, and limiting which clients could connect would do nothing to fix
that.

Limiting which clients could connect to the gnutella network would,
however, do a decent job of forcing to pay people for one of the
commercial clients. In this way it's very typical of how TCPA works - a
non-solution to a problem, but one which could potentially make money, and
has the support of gullible dupes who know nothing about the technical
issues involved.

 Be sure and send a note to the Gnutella people reminding them of all
 you're doing for them, okay, Lucky?

Your personal vendetta against Lucky is very childish.

-Bram Cohen

Markets can remain irrational longer than you can remain solvent
-- John Maynard Keynes


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-09 Thread Antonomasia

From: AARG!Anonymous [EMAIL PROTECTED]

 An article on Salon this morning (also being discussed on slashdot),
 http://www.salon.com/tech/feature/2002/08/08/gnutella_developers/print.html,
 discusses how the file-trading network Gnutella is being threatened by
 misbehaving clients.  In response, the developers are looking at limiting
 the network to only authorized clients:

 They intend to do this using digital signatures, and there is precedent
 for this in past situations where there have been problems:

  Alan Cox,  Years and years ago this came up with a game

 If only there were a technology in which clients could verify and yes,

 Be sure and send a note to the Gnutella people reminding them of all
 you're doing for them, okay, Lucky?

Now that is resorting to silly accusation.

My copy of Peer to Peer (Oram, O'Reilly) is out on loan but I think Freenet
and Mojo use protocols that require new users to be contributors before they
become consumers.  (Leaving aside that Gnutella seems doomed on scalability
grounds.)

Likewise the WAN shooter games have (partially) defended against cheats by
making the client hold no authoritative data and by disqualifying those
that send impossible traffic.  (Excluding wireframe graphics cards is another
matter.)  If I were a serious gamer I'd want 2 communities - one for plain
clients to match gaming skills and another for cheat all you like contests
to match both gaming and programming skills.

If the Gnuts need to rework the protocol they should do so.

My objection to this TCPA/palladium thing is that it looks aimed at ending
ordinary computing.  If the legal scene were radically different this wouldn't
be causing nearly so much fuss.  Imagine:
- a DoJ that can enforce monopoly law
- copyright that expires in reasonable time
 (5 years for s/w ? 15 years for books,films,music... ?)
- fair use and first sale are retained
- no concept of indirect infringement (e.g. selling marker pens)
- criminal and civil liability for incorrectly barring access in DRM
- hacking is equally illegal for everybody
- no restriction on making and distributing/selling any h/w,s/w

If Anonymous presents Gnutella for serious comparison with the above issues
I say he's looking in the wrong end of his telescope.

--
##
# Antonomasia   ant notatla.demon.co.uk  #
# See http://www.notatla.demon.co.uk/#
##

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella

2002-08-09 Thread Pete Chown

Anonymous wrote:

 ... the file-trading network Gnutella is being threatened by
 misbehaving clients.  In response, the developers are looking at limiting
 the network to only authorized clients:

This is the wrong solution.  One of the important factors in the
Internet's growth was that the IETF exercised enough control, but not
too much.  So HTTP is standardised, which allows (theoretically) any
browser to talk to any web server.  At the same time the higher levels
are not standardised, so someone who has an idea for a better browser or
web server is free to implement it.

If you build a protocol which allows selfish behaviour, you have done
your job badly.  Preventing selfish behaviour in distributed systems is
not easy, but that is the problem we need to solve.  It would be a good
discussion for this list.

 Not discussed in the article is the technical question of how this can
 possibly work.  If you issue a digital certificate on some Gnutella
 client, what stops a different client, an unauthorized client, from
 pretending to be the legitimate one?

Exactly.  This has already happened with unauthorised AIM clients.  My
freedom to lie allows me to use GAIM rather than AOL's client.  In this
case, IMO, the ethics are the other way round.  AOL seeks to use its
(partial) monopoly to keep a grip on the IM market.  The freedom to lie
mitigates this monopoly to an extent.

-- 
Pete

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Thanks, Lucky, for helping to kill gnutella (fwd)

2002-08-09 Thread R. A. Hettinga

At 1:03 AM +0200 on 8/10/02, Some anonymous, and now apparently
innumerate, idiot in my killfile got himself forwarded to Mr. Leitl's
cream of cypherpunks list:


 They will protect us from being able
 to extend trust across the network.

As Dan Geer and Carl Ellison have reminded us on these lists and
elsewhere, there is no such thing as trust, on the net, or anywhere
else.

There is only risk.


Go learn some finance before you attempt to abstract emotion into the
quantifiable.

Actual numerate, thinking, people gave up on that nonsense in the
1970's, and the guys who proved the idiocy of trust, showing, like
LaGrange said to Napoleon about god, that the capital markets had no
need that hypothesis, Sire ended up winning a Nobel for that proof
the 1990's*.

Cheers,
RAH
*The fact that Scholes and Merton eventually ended up betting on
equity volatility like it was actually predictable and got their
asses handed to them for their efforts is beside the point, of
course. :-).


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]