On Thu, Aug 17, 2000 at 06:30:23PM +1000, Zem wrote:
> As someone pointed out on the freenet-tech list, if there is a way of
> determining whether or not a node is transient, any requests which come
> from that node must have been originated by the operator.
> 
> For example:  feds run a node and log the IP addresses of any nodes
> requesting known "illegal" keys.  grep for any that belong to obvious
> dialup IP blocks at major ISPs.  Since dialup freenet nodes must be
> transient, those requests must have come from the user.  Search warrant,
> bust, repeat.

This is more or less correct, a transient node doesn't set the DataSource
field, so one can see that a transient node has connected. Running a
transient node is more about performance (keeping your own routing table)
then adding any real security above just using a plain client.

<> 
> > You must have an Address->Key link so that you can say "I expect Address
> > to have this key", at which point you can verify something.

I still don't agree with Scott here. The only reason to have the Public
Key fingerprint is so that the node can check that it is actually talking
to the node that it got from the DataSource. I don't think allowing nodes
to look up new addresses from the fingerprint should connecting to the
old address fail is a security whole, you still know it's the same node -
but it has to be considered something that the node does rarely and on
"maintence time" (we will never support nodes on dialup lines changing
ip-s every hour like this).

I'm actually warming up the idea of making the address:

physical address + fingerprint + number

and having the node lookup:

ARK(fingerprint , (number + 1))

should the connect fail (ARK is Address Resolution Key).

> Any use of public keys implies a web of trust, no?

No, there is no real web of trust here. Or a loose one at most. Nodes
learn about new nodes by reading the DataSource: field in data carrying
messages, and then connect to it. There is no way of verifying that the
address in the DataSource is the "correct" in any sense of the word - it
could very well be pointing at a malicious node.

However, with the current system, you can jump on a node and just MITM
connections as you like. If we have the proposed PK fingerprint on the
DataSource address, then you have to try to infiltrate the nodes that the
node is talking to in order to place false DataSource: addresses in the
messages.

> So node Alice has been speaking to node Bob for a long time, and has
> added Bob to the list of "trusted hosts" (or whatever).
> 
> One day Bob shows up with the same key but a different IP address.
> 
> Alice should be able to conclude that this is the same Bob, and should
> therefore be accorded the same trust rating (whatever that is).
> 
> Why should any of this be tied to the physical IP address?

Except for the part about "trusted hosts" (we trust nobody) I agree.

> 
> 
> -- 
> zem at zip.com.au   F289 2BDB 1DA0 F4C4 DC87 EC36 B2E3 4E75 C853 FD93
> zem.squidly.org  "..I'm invisible, I'm invisible, I'm invisible.."
> 
> _______________________________________________
> Freenet-dev mailing list
> Freenet-dev at lists.sourceforge.net
> http://lists.sourceforge.net/mailman/listinfo/freenet-dev
> 

-- 
\oskar
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 238 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20000817/a28bc09c/attachment.pgp>

Reply via email to