Author: toad
Date: 2009-01-21 00:10:58 +0000 (Wed, 21 Jan 2009)
New Revision: 25154

Modified:
   trunk/website/pages/en/faq.php
Log:
Rewrite the attacks section of the FAQ. Tor *does not* provide protection 
against advanced traffic analysis nor does it protect against compromising a 
majority of the nodes on the network. Our threat models are different, explain 
what attacks are possible on Freenet.


Modified: trunk/website/pages/en/faq.php
===================================================================
--- trunk/website/pages/en/faq.php      2009-01-20 23:12:40 UTC (rev 25153)
+++ trunk/website/pages/en/faq.php      2009-01-21 00:10:58 UTC (rev 25154)
@@ -447,42 +447,88 @@
 probe which freesites you have visited, and report this information to their 
owners.
 
 <p><b id="attack">Won't attack X break Freenet's anonymity?</b><br>
-Short answer: Probably yes.</p>
-<p>Long answer:</p>
-<p>Freenet does not offer true anonymity in the way that Tor and the
-<i>Mixmaster</i> cypherpunk remailers do. Most of the non-trivial attacks 
-(advanced traffic analysis, compromising any given majority of the nodes, etc.)
-that these were designed to counter would probably be successful in
-identifying someone making requests on Freenet.</p>
-<p>Your identity is always visible to the nodes you are actually connected to.
-They know what keys your node requests: your anonymity against them
-is a limited level of plausible deniability, that maybe you are 
-forwarding these requests for some other node. Unfortunately, your peers can 
do 
-<a href="http://wiki.freenetproject.org/CorrelationAttacks";>correlation 
-attacks</a> to figure out which requests are from you and which requests are 
from
-your peers or somebody else. These attacks rely on the attacker knowing what
-the keys are for, and there being lots of them, so for example, a big 
splitfile, 
-a big freesite inserted regularly, a Frost poster maybe who uploads files 
too.</p>
-<p>At the moment, the most important thing you can do to protect yourself is 
to 
-get lots of <a href="http://127.0.0.1:8888/friends/";>"Friends"</a>
-aka <a href="http://wiki.freenetproject.org/DarkNet";>darknet</a> connections:
-these are permanent, fixed connections to people you actually know. Once you 
have 
-enough, you can turn off <a 
href="http://wiki.freenetproject.org/OpenNet";>opennet</a> (aka insecure mode),
-and only connect to people you know. This makes it very much more expensive 
for an 
-attacker, as he has to infiltrate the social network, rather than just 
-<a href="http://wiki.freenetproject.org/NodeHarvesting";>harvesting</a> the 
opennet
-and connecting to nodes (which is technically very easy). One significant 
-advantage over Tor etc is that if enough users only connect to Friends, it is 
very
-difficult to block the entire network; blocking Mixmaster or the current Tor 
on 
-the other hand is very easy.
-<p>The only way that we can offer true
-anonymity is if the client can directly control the routing of data,
-and thus encrypt it with a series of keys of the nodes it will pass
-through (a la Mixmaster). There are plans to implement 
-<a href="http://wiki.freenetproject.org/PremixRouting";>"premix routing"</a>
-during <a href="http://wiki.freenetproject.org/FreenetZeroPointEight";>Freenet
-0.8</a>, which would function similarly to Mixmaster remailers, Tor, etc, for
-the first few hops, but this is still a long way off.</p>
+<b><b>Short answer:</b> Probably yes.</p>
+<p><b>Long answer:</b></p>
+<p>Freenet has a different threat model to Tor and the Mixmaster remailers,
+partly because it has different functionality. Freenet is designed to resist
+censorship. The network must therefore be robust, and content must be 
distributed
+without requiring a central server, whether anonymous or not. Defences focus 
+generally on a distant attacker attempting to find a whistleblower. Tor on the 
+other hand is designed to anonymise real-time data streams, and assumes that 
+there is a "free world" where a large number of nodes can be run in the open 
+without any threat of their being shut down. Freenet also has no concept of a 
+"client": all participants are nodes, relaying requests for other nodes as 
well 
+as possibly starting their own.</p>
+<p>Mixmaster style networks are claimed to be robust against compromise of 
vast 
+numbers of nodes, and advanced traffic analysis, but introduce delays of 
several
+hours; both Freenet and Tor are more or less real-time systems, and therefore
+compromise to some degree (often configurable) to enable usable 
performance.</p>
+<p>The attacks are different for the two types of networks. There are a range
+of attacks that work on Tor but do not work on Freenet (e.g. intersection 
attacks),
+and there are many attacks that work on Freenet but have no equivalent on Tor. 
Most
+of the below attacks against Freenet are greatly mitigated by running darknet 
mode;
+that is, adding connections to your (at least nominally trusted) friends on 
the 
+Friends page, and setting the security level to HIGH or MAXIMUM so that your 
node 
+connects only to your friends. Adding connections to people you don't know 
will not
+significantly improve your security as they might well be attackers, and it 
will
+break the network topology and reduce overall performance, so please don't do 
it.
+Also, in Freenet 0.9, we expect to add a form of cryptographic tunnels, vaguely
+related to Tor's onion routing; this should greatly reduce the impact of most
+of the below attacks, especially on darknet mode. </p>
+<b>Very long answer:</b>
+<p>In the interests of giving would-be users as much information as possible, 
and on
+the assumption that any serious attacker would do their homework, here are the 
major 
+classes of attack on Freenet we are presently aware of:</p>
+
+<ul><li><b>Harvesting</b>: Simply by running some powerful Freenet nodes, an 
+attacker can identify most of the opennet (Strangers network) relatively 
easily.
+These nodes can then be attacked one by one (subject to resources), their 
traffic
+analysed, or simply blocked on a national firewall. Connecting only to friends
+largely solves this problem. It is still possible for ISPs to identify nodes 
with 
+traffic flow analysis. Obviously a large network will make this harder. And 
this 
+attack is trivial on Tor, although they provide a means to work around it.</li>
+<li><b>Datastore attacks</b>: Everything any node requests through your node is
+cached locally. Everything you fetch is also cached locally (we may make this 
+configurable at some point, but turning it off enables an easier attack). If 
the
+attacker can obtain your hard disk, or connect to your node and probe your 
datastore
+by requesting keys and timing how long they take, he may be able to determine 
what
+you have been downloading from/uploading to Freenet. Right now the best way to 
+prevent this is to only connect to your trusted friends, as above. In version 
0.9, 
+we will implement some form of cryptographic tunnels, which will eliminate the 
+need to cache locally requested data in the datastore and largely solve this 
attack.</li>
+<li><b>Correlation attacks</b>: If you are connected to a node, and can 
recognise
+the keys being requested (probably because it was posted publicly), you can 
show 
+statistically that the node in question probably requested it, based on the 
+proportion of the keys requested from that node, the locations of nearby 
nodes, the 
+HTL on the requests and so on. This will again be largely eliminated by 
tunnels.</li>
+<li><b>Adaptive search</b>: If you want to find the author of some content, 
and you
+can predict the content or the keys to be inserted, you can listen out for 
their 
+inserts. Each request gives you a data point suggesting roughly where the 
originator 
+might be (on the location space), and on each insert you intercept you can 
move 
+slightly closer to the originator, by obtaining connections to nodes which are 
closer 
+to your current guesstimate of the target's location. If you are right these 
new 
+connections will yield more of the target's requests/inserts, and you can 
rapidly 
+close in on the originator. The best defense right now is darknet (connecting 
to 
+friends only): Darknet makes it very difficult for an attacker to obtain new 
+connections closer to his guess of where the target is. The tunnels proposal 
will 
+likely make this attack considerably more difficult. Also, if the attacker 
cannot guess 
+the content to be inserted in advance, this is very much more difficult (hence 
+reinserting big files is <b>bad</b>); we will randomize the insertion keys in 
0.9 to 
+give additional protection for inserters. And of course this is of no use for 
tracing 
+the author if the author has finished the insert and left the network: you have
+to intercept the insert while it is in progress.</li>
+<li><b>Traffic analysis</b>: Freenet provides minimal protection against global
+traffic analysis (basic message padding etc); if the attacker also has nodes 
on the 
+network, the extra data will likely be helpful. However on Tor-style networks,
+global traffic analysis will defeat the network completely: all that is needed 
is
+to observe both the entry and exit points. Freenet is not quite so vulnerable 
+because it doesn't use tunnels.</li>
+<li><b>Swapping attacks</b>: It is possible to attack the swapping algorithm, 
and
+thereby disrupt the network. This has been demonstrated by the authors of the 
Pitch 
+Black paper. We are working on a solution, but this only affects the darknet 
(Friends 
+network), which presently is a small proportion of the overall Freenet.</li>
+</ul>
+</p>
 <p>More information on the current practical state of Freenet security is 
available
 <a 
href="http://wiki.freenetproject.org/FreenetZeroPointSevenSecurity";>here</a>.
 

_______________________________________________
cvs mailing list
[email protected]
http://emu.freenetproject.org/cgi-bin/mailman/listinfo/cvs

Reply via email to