CONCLUSIONS: 00. Without major changes, inserts even on opennet of unpredictable files provide reasonable security assuming the attacker can't create a lot of nodes; the limiting factor is the predictable inserts which are associated with them (forums posts, USK site top blocks etc). Unfortunately we can't quantify how many such predictable inserts are needed to break an identity currently. Sadly, downloads are much easier to trace at present.
0. Announcement needs fixing desperately, for performance reasons as well as massive security issues. (Complex but important, some of it is longer term than others, but much of it needs doing soon) 1. We can greatly improve insert security by initial random route. Inserts are slow already, and already have no-cache on the first few hops, so we don't necessarily need any more hops; so the cost should be small. (Easy, IMHO this should be done soon) 2. For predictable inserts (top blocks, forum posts, maybe even selective reinserts), it *might* be worthwhile to implement rendezvous tunnels. The cost would be relatively small. Also, it is probably useful for gathering security-sensitive data for both the Pitch Black fix and testing announcing nodes. So we probably do need this... (Potentially significant project but easier than announcement changes; we should do this within a few months IMHO) 3. Connection-age-based routing restrictions may make sense to partially prevent MAST for downloads. The problem is, the download may take longer than any reasonable connection age restriction. In which case we need to either fail, warn the user, or switch to rendezvous tunnels. 4. Unfortunately, for downloads, rendezvous tunnels (or even initial random routing) will be rather expensive. We could make them configurable, and the code will probably be shared with that for inserts, so it might still be worth looking at. 5. A "proper mixnet" is possible, and likely faster than either rendezvous tunnels or initial random routing, at least on opennet. On opennet, it would use direct connections between nodes on the chain. On darknet, it would probably be relayed internally, so be rather slow, but would still be usable for top blocks, and is much less necessary for unpredictable inserts or normal downloads on darknet. One of the limiting factors is I'd need to do a lot of reading, and probably get some design help after that. For bulk requests, with some work on load management, this could be an actual mixnet rather than an onion network, so more resilient to traffic analysis than e.g. Tor. 6. Darknet's primary purpose is robustness IMHO. It should be more anonymous in that most attacks are much harder. In particular, Sybil attacks may allow an attacker to e.g. dominate the keyspace and thus have a good chance of controlling all the nodes on the mixnet path. We still need darknet, and there are many ways we can improve it.
signature.asc
Description: This is a digitally signed message part.
_______________________________________________ Devl mailing list Devl@freenetproject.org https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl