On 21/03/14 04:42, Steve Dougherty wrote:
> On Tuesday - March 25th - I have a meeting scheduled with Professor J.
> Alex Halderman [0] to talk about security and Freenet. He is one of the
> people behind such research as Green Dam arbitrary code execution, [1]
> cold boot attacks on disk encryption, [2] and insufficient entropy on
> embedded systems leading to weak encryption keys. [3]
Nice.
> What should I say? I'm planning to mention:
Bear in mind that nobody, no matter how brilliant, is an expert in
everything. That is, some of what we are concerned with may be outside
his area of expertise, and he probably won't understand all the
project-internal jargon immediately.
> 0) Overview of Freenet's functionality and that of plugins/applications.
> 1) Do you have suggestions on where the Freenet project can find
> security auditors or additional developers?
We are a very long way from the point at which auditing would make
sense. However, we do need more resources.
> 2) Would it be possible to run a seed node on campus?
> 3) Open research questions: [4][5]
>     * Pitch black - what mitigations have we come up with?
We have a plausible solution, we gave it to thesnark, he said it seemed
to work but never came up with any numbers or graphs, so we haven't done
anything with it ...
>     * Can opennet be secured?
No. Sybil always wins: IP addresses, bandwidth, CAPTCHAs, CPU time,
everything is dramatically cheaper for an attacker than for an average
legitimate user IMHO. (And note that to try to exploit e.g. IP address
scarcity would be extremely complex and cost us some legitimate users)

The only solution other than darknet AFAICS is charging people real
money (possibly BTC) to join opennet. This would require a much greater
appeal to start with, and more reliable software. In BTC, the funds (or
a large part of the funds) would be provably destroyed, possibly with
the rest going to FPI or a charity chosen from a list (need to make sure
it doesn't go straight back to the guy trying to exploit announcement!).

But it's good to get some third party input on this, check our assumptions.
>     * Is the network topology stable - does it settle? My simulation
> work in GSoC 2012 suggested it did not. As the simulation moved away
> from Sandberg's model and toward more of what Freenet does it got less
> stable. Does this have practical implications?
Huh? You were simulating a hybrid network? My only recollection of a
hybrid simulation was some quick hack Ian did some years ago to settle
an argument. If a hybrid network isn't stable that's another good reason
to focus on making darknet as easy and fast as possible.
>     * How can forums scale? PSKs? 
Fundamentally making forums work efficiently boils down to "scalable
spam-proof distributed search". This is an unsolved problem, and may
even be intractable, as I understand it ... Hence some of my proposals
have been an attempt to reduce the need for scalability by breaking the
problem up into different contexts, e.g. different set of identities to
poll per board. Eventually you run into the same Sybil problems as on
opennet - everything depends on CAPTCHAs. There may be darknet-based
ways to limit introduction spam; if not you need blind money or
something similar ... Or accept that the forums will end up being invite
only too (you could bundle forum invites with your darknet invite, but
ideally blinding somehow?)
> [6] What about real-time chat?
For small scale, without spam, we could implement this relatively
quickly; there are several planned improvements that would cut latency
significantly.
>     * Can load balancing be improved?
I'm sure it can, but we need help on it. Some of my uni contacts might
even be able to help with this eventually.

He might ask about recently published attacks.
- Traceback (using RejectedLoop/request UIDs to trace individual
requests after the fact): The simplest solution to this is not to
remember UIDs after the request has finished. This eliminates 99% of the
threat. This is what we have implemented (there are various other
approaches). There is a paper on another mitigation which I was going to
have a look at ...
- Routing table injection: This is a meta-attack which relies on
opennet, abusing path folding and announcement. IMHO it is intractable,
but there are a number of powerful attacks on opennet. (I've been
invited to prepare a short presentation on attacks for the Cambridge
security group, I will make the slides available for freenet devs when I
eventually get to it).
> - Steve
>
> [0] https://jhalderm.com/
> [1] https://jhalderm.com/pub/gd/
> [2] https://citp.princeton.edu/research/memory/
> [3] https://factorable.net/paper.html
> [4] https://wiki.freenetproject.org/Research_challenges
> [5] https://emu.freenetproject.org/pipermail/devl/2012-October/036569.html
> [6] https://emu.freenetproject.org/pipermail/devl/2012-October/036564.html

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to