On 05/09/14 19:43,
localghost@eOC4Zm8KjRpMFhNBp6DmI8K4URaq8bQZH45y0dLHEnI wrote:>
creamsoda@0vpcRHZV1ftyj4mJpZnuYaG8wpkNIvf3qa3b-LUcsZs wrote :
>>
>> TAILS is meant to be for short-lived sessions of minutes to hours
right? That doesn't lend itself well to freenet which works better over
a longer time.
>
> Ya, I kinda figured that.. just curious if anybody had done it. I was
asking for a friend, as stated. I prefer to let Freenet run constantly,
to help the network- and have not used TAILS, personally..
>
This is exactly why "leave disk crypto to the operating system" isn't so
obviously the right policy for Freenet.

The arguments for not doing disk crypto:
- We're likely to get it wrong.
- If they download video files etc there will probably be leaks. (But it
IS possible to limit this)
- Memorising a good password is hard, and the users who are willing to
do so may be the same group as the users who will install a secure linux
distro just to run Freenet, or at least do full disk encryption on
Windows (presumably using BitLocker?)
- If we do disk crypto we need to turn on swap encryption. This is
trivial on recent Windows but arguably not a good idea.

The arguments for doing disk crypto:
- We want people to run Freenet long-term. They usually won't install a
new OS just to run Freenet, and they can't run it long-term from a
livecd. This is one of the reasons we support Windows!
- People who are willing to remember a long password may not have the
technical know-how to set up a secure system.
- People who install Freenet casually and then discover something
interesting may not want to reinstall at that point.
- Tempfiles and other evidence of your past browsing should not be
recoverable even if you *have* the password. Most full disk crypto
setups don't have this property, but some do (e.g. /tmp on encrypted swap).
- We can do some interesting things in the long run such as combining a
password with a local nonce and data fetched from the network to decrypt
local data, giving "hidden identities" e.g. for WoT/FMS.
- In practice physical attacks are likely to be more common than network
attacks, in most environments.

A long term solution might be to have a separate node (which doesn't
store anything private), possibly on dedicated hardware, and client
(which stores your downloads and runs from a livecd or whatever, and
uses tunnels through the node). But we need a decision in the short run.

I used to think that disk crypto in Freenet made sense. I'm half
convinced by the "good passwords are hard" thing. operhiem1 (Steve) is
in favour of removing it, as is nextgens and most of the old guard (unix
philosophy etc). I'm not convinced one way or the other. I will defer;
I'll be away very soon; but it's worth discussing again maybe...

Technically keeping passworded disk crypto isn't particularly difficult:
- Review and merge the crypto pull request. We need this anyway.
- Integrate with purge-db4o. (Fairly easy)
- Use a proper iterated password function.
- Think about changing the UI e.g. ask for a password when first start a
download? But what about client-cache?

Removing it will mean decrypting people's data and posting a useralert.
It slightly speeds up the schedule for purge-db4o.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Devl mailing list
Devl@freenetproject.org
https://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to