Signal 11 core-dumped:

> I would consult /etc/services 

More specifically:

        1) Does Windows have the equivalent of /etc/services?  

        2) Can we truly rely on a grep of the local /etc/services 
        to provide a comprehensive list?  If other machines (like 
        the local firewall) are involved, can we programmatically 
        find and grep them?  What else should we consult?


> setting up a "test box" and then trying to connect to each port in 
> sequence would be a good way to figure this out automagically.
> Someone needs to volunteer a test box, however. :) This, AFAIK, is
> how ICQ, Yahoo Messenger and the AIM client all bypass firewalls.

Really?  Wow.  Well, if popular clients are out there bypassing 
firewalls by testing for an opening, then I'm not nearly as worried 
about doing the same thing.  I guess it makes sense that scanning for 
a port out of firewall is viewed with less concern than scanning for 
a port into one.  


> There still needs some way (eventually) to automatically communicate
> this to new nodes. I'm out of ideas on this one - the only way is
> to have a central server.. which is what freenet is trying at all
> costs to avoid.

There are other out-of-band ways to get the message across besides 
a single central server, but you're point is well-taken.  Yes, using 
different ports at different times means people have to be more 
careful about keeping their contact information updated and accurate.
Fortunately, Freenet does a good job of taking over once you get in, 
so this problem should not be a show-stopper.  

I have some ideas about the out-of-band problem.  I'm sure some other 
people do as well.


> someone is going to
> simply hack their client to portscan as it is more efficient than
> guessing ports at random.. effectively a very slow portscan. It
> might as well be in the "official" client if that will be the 
> de facto standard for finding Freenet nodes...

You really want to put a port scanner into the reference client?  
Uh, take it up with Stephen, but the concept makes me nervous.  I 
got the impression that sysadmins really take it personally when 
someone rattles each door on their house to see if they're all 
locked.  I'd much rather just tell users to go find the right addy 
and port in the first place.  Those who want to port scan can use 
the source, luke.


> Napster does not have plausible deniability as their servers
> maintain a plaintext list of who has what.  Freenet will not
> have this ability,

Yes, yes, I know about all that.  I just meant that trying to 
"plausibly deny" that you accessed illegal material depends in 
part on the assertion that there is frequent and routine usage 
of Freenet for legal purposes.

The problem here is that we have a tradeoff.  The more you hide 
nodes, the less likely a node operator will get caught running 
one.  On the other hand, once they are caught, they are more 
likely to be successfully prosecuted (in the context of the 
current discussion).  But if it's nearly certain that your node 
will be detected anyway, then trying to hide it will not keep 
you from getting caught, and will only increase your punishment.  
The better alternative is to make no bones that the node exists, 
and emphasize approved uses for Freenet like automatic caching 
of "Slashdotted" web sites and such.


> Unless of course Freenet per default hides itself. There are good
> justifications for this... one of which is that by providing a
> central list of servers, you are giving attackers an easy way to
> trash the entire network. Hiding/obscuring nodes would help it
> to resist DoS attacks - a noble goal.

Yes, have Freenet use random ports by default.  My own motivation 
is that it would be helpful to future stego nodes.  I hadn't 
thought about the "good against DoS attacks" angle, but I'm glad 
you mentioned it.  


--Will


_______________________________________________
Freenet-dev mailing list
Freenet-dev at lists.sourceforge.net
http://lists.sourceforge.net/mailman/listinfo/freenet-dev

Reply via email to