Nicholas Weaver wrote:
Closed world networks work when small, they fail when large. Its
exactly the botnet analysis problem, and there is a lot that can be
done once you get a single node, let alone the ability to participate.
Agreed, but these networks may in fact be relatively small.
If you carefully control admission and use some group key games, you
MIGHT be able to do it, but I wouldn't count on it.
You can invite individual nodes with cryptographic certificates as
credentials. It requires having the client code and posessing a valid
invitation certificate to join. In the real world, that can be made hard
to come by.
A) Then don't use localization for such a sensitive application!
This application you describe views the network as an opponent, so you
aren't going to want to use external localization services at all!
Period. Because just the ACT of querying tells the localization
service information, as well as node information, and a bunch of others.
This is what developers should do, yes. But in some cases they want to
make a tradeoff between more security and getting the locality data.
This is 2009... why there are *any* protocols being deployed that don't
have encryption, authentication, anti-tamper, etc. I don't understand.
B) An ISP vantage point doesn't just see one node, but a boatload of
nodes.
True.
My argument however is you are at a middle ground on privacy that is
ALMOST useless: active attackers and ISP level monitoring can rip
through so much of the privacy at the level you describe.
That such an application can't use a localization service is, to my
mind, a small loss: such applications shouldn't really exist anyway
because most of the privacy preserving is an illusion.
You may be right. However, developers have requested the ability to use
locality awareness without transmitting large lists of addresses as
plaintext. I can see their point, given my above comment about
development of highly insecure protocols for today's Internet.
Matthew Kaufman
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto