-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> > CBR links only hide information from external adversaries.  They're
> > transparent to internal adversaries.
>
> True enough. But there are ways to prevent internal attackers
> masquerading as zillions of nodes:
> - Costly identity via hash- and think- cash.

Agreed, there are methods for minimizing Sybil with regards to the
P = (c/n)^h here.

> - Darknets, with cellular tunnel selection.

Depending on darknets for the peer selection is the same as saying
"dunno, let the user figure it out".  But, thats a topic for another
discussion.

> > > 1. Pure CBR. All node links are exactly 1kB/sec. Not practical for I2P,
> > >    very wasteful for freenet.
> >
> > (1) is a nonstarter.  You've just jacked the queueing times into
> > *hours* for most uses.  That is, assuming people stop adding to the
> > queues and it doesn't fall into congestion collapse.
>
> Feasible for Freenet, including distributed pub/sub streams using
> passive requests. Not so sure about 1:1 streams! Remember that we've
> probably only got 20kB/sec or so upstream.

We've already had these discussions about whether Freenet's routing
can deal with congestion, with the net result being "we'll see".
Now you're saying you'll enforce a maximum link capacity of 1KBps?

Well, there are enough details not specified yet for us to continue
with the "we'll see" response, I suppose.

> > For 2-4, how are the CBR rates negotiated?
>
> Sorry, below you're talking tunnels; I was talking links, to prevent
> external attackers (both passive and active) from exposing traffic.

Ah, you're right, though the above question still stands.  Let me
revise my questions:

> > In any case, 2-4 must use a CBR no higher than the individual nodes'
> > free capacity, and the rate selected reduces the anonymity set of
> > the traffic carried to the order of other links with similar rates.

Still pertinent for CBR links.

> > (2), if I understand correctly, means the tunnel stays constant at
> > the tunnel's negotiated CBR rate at all times.  This fails pretty
> > clearly in the same way pipenet does.

Still pertinent for CBR links, replacing "tunnel" with "link".

> > (3), if I understand correctly, means the tunnel doesn't do any CBR,
> > beyond some algorithm that verifies that by the end of the tunnel's
> > lifetime, the total number of messages transmitted equals what it
> > would have transmitted if it were CBR'ed like (2).  Right?
> >
> >
> > Off the top of my head, I don't see a simple algorithm for achieving
> > reasonable CBR without leaking the flow.  For instance, I2P uses a
> > token bucket for bandwidth limiting - every 100ms, we add in some
> > new tokens, and whenever we want to send out a packet, we wait until
> > we can grab enough tokens from the bucket.  The 'always active'
> > state of such a scheme is CBR, but its patterns of downtime (when
> > tokens accumulate in the bucket) as well as its patterns of bursting
> > (when excess tokens are pulled from the bucket faster than they are
> > added) are visible.

Needs adjustment for CBR links, but only by replacing the "tunnel
lifetime" variable with duration of the "long term" averaging.

> > I'm not sure I understand (4).

Still pertinent for CBR links :)

=jr
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDYRRvWYfZ3rPnHH0RAh0nAJ9bCqtbKjdw+nyGk1BkcU22x3TFpACfd+GN
RifkHu6BKCYEpFTR251QDEc=
=PgXU
-----END PGP SIGNATURE-----
_______________________________________________
chat mailing list
chat@freenetproject.org
Archived: http://news.gmane.org/gmane.network.freenet.general
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/chat
Or mailto:[EMAIL PROTECTED]

Reply via email to