On Monday 22 Jul 2013 11:40:32 Matthew Toseland wrote:
> On Sunday 21 Jul 2013 23:20:40 Robert Hailey wrote:
> > 
> > I'm not 100% sure how this might work, but having opennet require a 
> > security device might be publicly acceptable, and might also serve as the 
> > monetary disincentive to an opennet sybil attack.
> > 
> > Without looking too much into it, I supporting a smartcard interface from 
> > java (across many platforms) would be problematic. A one-time-password 
> > (OTP) solution might work, though.
> > 
> > One such device I have experience with:
> > http://www.yubico.com/products/yubikey-hardware/yubikey/
> > 
> > Such an onboarding user story might look like this:
> > (1) a new user browses the freenet site and finds out that freenet 
> > generally requires a yubikey
> > (2) they install freenet, but it doesn't work (or works poorly), and also 
> > says something about needing a yubikey
> > (3) we lose a bunch of lookie-loos with an interest in freenet that is 
> > <$15+time, but security-interested folks might be further interested in 
> > getting "the security device that freenet requires" anyway
> > (4) so those that remain order a yubikey (min quantity 1),
> > (5) a few days later, the device arrives (quick-ish, as singletons are 
> > mailed in an envelope)
> > (6) they go back to freenet, click in the "yubikey field" and mash the 
> > "button" (it's actually a capacitance sensor, I think)
> > (7) through some mechanism not visible to the user, the OTP is verified and 
> > an opennet certificate is issued
> > 
> > Maybe at some semi-obvious state change (like a machine reboot, or the 
> > yubikey being used on another N machines?) or period (monthly), the field 
> > would popup again to make it seem important & remind the user that a 
> > yubikey is needed to spread freenet.
> > 
> > The generated OTP has a prefix that uniquely identifies it (sorta like a 
> > serial number), and can only be verified *once* (it is then, by definition, 
> > stale).
> > 
> > If we use the default "short-press" identity that comes with the key, then 
> > we would be implicitly trusting YubiCo to not hand out gobs of identities 
> > to an attacker (i.e. without paying). In fact, that's the only option 
> > really... we could not use a custom identity, b/c either we would have to 
> > supply/program the keys or we'd be right back to a sybil attack (they just 
> > put the OTP algo in software).
> > 
> > The implementation of step #7 really depends on wether or not we trust our 
> > seed nodes, and wether or not making a conventional http/https connection 
> > is acceptable. NB: we could always bundle a public key in with  freenet to 
> > make it "safe" to hand off an encrypted OTP for delivery back to the 
> > mothership... I mean, "central server".
> > 
> So this is just a cheat to prevent users from realising that we're charging 
> them to join Freenet? Dishonest, and dubious. Unless there is a really good 
> reason why we need two factor authentication?
> 
> And technically, it can't be just any YubiKey - we need to sign the 
> certificate.
> 
Okay so the idea is:
1. Marketing: the user has something they can keep and use for other things.
2. Uniqueness/cost guaranteed by the manufacturer: We can use an online service 
to establish that it's a genuine, unique yubikey, different to the yubikey's 
that have announced before. Then we generate a bootstrapping cert. If they take 
said service offline, no big deal, because we only use it once, on creation.

Maybe this is a possibility. We'd need a bitcoin option as well though.

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to