How far can we go in abusing the production network in order to make it
work? The testnet is never likely to be large enough to be a useful
model. What I propose is that on swap requests, which already include
the location of the node, and the locations of its peers, we also add a
unique ID (say the first 8 bytes of some hash of the identity) for the
node and each peer.

This would make it easier to map the network. It is already possible to
map the network but it is a lot of work and a lot of uncertainty,
because we don't know about every swap so we have to try to do partial
matches.

This may make some attacks easier. Having said that, with the current
swap requests, you can probably identify the topology close to you with
some confidence. The main benefit here is in identifying the topology
further away more reliably. Which isn't that interesting for attackers
unless they've been e.g. watching #freenet-refs and can match an IP
address to each node on the network. Even then, there are much easier
attacks, and correlation attacks on nodes 4 hops away may not have
enough information.

The benefit is we could test all our pet theories about the shape of the
network being completely broken due to #freenet-refs . We could gather
real world information about node uptimes, location swapping, location
clustering. It would of course be spoofable, but only to the extent that
location swapping is already spoofable. It would double the size of the
swap request packets, but these are fairly small.

What do you think?
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20070323/fd0d7abb/attachment.pgp>

Reply via email to