[freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
On Thursday 24 June 2010 04:05:48 Evan Daniel wrote: On Wed, Jun 23, 2010 at 5:43 PM, Matthew Toseland t...@amphibian.dyndns.org wrote: On Wednesday 23 June 2010 20:33:50 Sich wrote: Le 23/06/2010 21:01, Matthew Toseland a écrit : Insert a random, safe key This is much safer than the

Re: [freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
On Thursday 24 June 2010 18:28:42 Matthew Toseland wrote: On Thursday 24 June 2010 04:05:48 Evan Daniel wrote: On Wed, Jun 23, 2010 at 5:43 PM, Matthew Toseland t...@amphibian.dyndns.org wrote: On Wednesday 23 June 2010 20:33:50 Sich wrote: Le 23/06/2010 21:01, Matthew Toseland a écrit

Re: [freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
On Thursday 24 June 2010 18:28:42 Matthew Toseland wrote: On Thursday 24 June 2010 04:05:48 Evan Daniel wrote: On Wed, Jun 23, 2010 at 5:43 PM, Matthew Toseland t...@amphibian.dyndns.org wrote: On Wednesday 23 June 2010 20:33:50 Sich wrote: Le 23/06/2010 21:01, Matthew Toseland a écrit

Re: [freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
On Thursday 24 June 2010 18:28:42 Matthew Toseland wrote: On Thursday 24 June 2010 04:05:48 Evan Daniel wrote: On Wed, Jun 23, 2010 at 5:43 PM, Matthew Toseland t...@amphibian.dyndns.org wrote: On Wednesday 23 June 2010 20:33:50 Sich wrote: Le 23/06/2010 21:01, Matthew Toseland a écrit

[freenet-dev] Planned changes to keys and UI

2010-06-24 Thread Evan Daniel
On Wed, Jun 23, 2010 at 5:43 PM, Matthew Toseland wrote: > On Wednesday 23 June 2010 20:33:50 Sich wrote: >> Le 23/06/2010 21:01, Matthew Toseland a ?crit : >> > Insert a random, safe key >> > This is much safer than the first option, but the key will be different >> > every time you or somebody

[freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
the data as fast or as slow as possible. It is compatible with sneakernet, it is compatible with CBR links. Ideas? Challenges? Suggestions for how to deal with opennet in this framework? -- next part -- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: This is a digitally signed message part. URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20100624/0339c74a/attachment.pgp>

[freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
you are vulnerable. So either: 1) We route once, and reroute downstream. I.e. full passive requests. Which would combine very neatly with passive requests - when a peer comes online, check its bloom filters for anything that you or any of your pending requests want. However, this is a big step beyo

[freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
y them anyway, by the timestamp being the same (or very close, but that might allow some window for progression for attackers), or by correlated keys (for requests). 2. We can then round-robin between them. So we send a bundle asking for a freesite, and we expect it to complete more quickly than the bundle we sent requesting a (gnu/hurd!) DVD ISO. 3. We can send the requests more efficiently, we don't need one message for each request, we can send a bulk transfer with all the keys, the first block or even a separate message specifies the HTL, etc. Okay it might be possible to compress requests anyway ... but it makes more sense if it's a bundle ... -- next part -- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: This is a digitally signed message part. URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20100624/8b3ae1fb/attachment.pgp>

[freenet-dev] Fast *and* secure Freenet: Secure bursting and long term requests was Re: Planned changes to keys and UI

2010-06-24 Thread Matthew Toseland
ata, because there is no abort. If an alternative route to A is found, then C will have less reason to penalise B if (when!) it reconnects. Should there be an abort option? The problem is that being able to start a transfer and then abort it facilitates censorship attacks. Classically Freenet resists censorship because if you fetch a key and take out the node that returned it, the data will have been cached downstream. We should check fairly urgently whether the current code allows for aborting transfers all the way down, I think it did but I fixed it. Another interesting point with all this is it requires quite a lot of disk space - the maximum in-flight data for each peer. -- next part -- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 197 bytes Desc: This is a digitally signed message part. URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20100624/23adbc10/attachment.pgp>