On Monday 24 March 2008 18:06, Michael Rogers wrote:
> Matthew Toseland wrote:
> > Given that the attacker can only identify the insertor after the last 
block is 
> > inserted, the attacker can still check logs on nodes he controls, after he 
> > has the top block. These may give him a reasonable fix on the originator 
> > keyspace wise, however the amount of information is limited by the 
distance 
> > between the attacker and the insertor.
> 
> The attacker in your scenario seems to be asking "who inserted/requested 
> file x", but if the attacker asks "which files did node y 
> insert/request" then the logging attack is quite effective: the attacker 
> connects to the node*, and if the node requests a large fraction of any 
> splitfile then it's probably the original inserter/requester. Simple as 
> that. 

Right. That's a classic correlation attack. If the attacker is a random 
darknet user who simply wants to see what his peers are doing, or if he is 
able to connect to every node at once, or a big enough section of the network 
that he can systematically work his way through it and hopefully catch his 
target inserting (especially if the target's inserts are large), this is 
feasible. However, if the network is large and the attacker's capacity for 
connecting to many nodes at once is limited, or if the attacker needs to 
trace the originator very quickly, an adaptive search as I have described 
will be more feasible / yield results much faster.

> It doesn't matter whether you insert the top block first or last -  
> when the attacker learns the top block's key he just needs to check his 
> logs for the other blocks. (I know you know about this attack already, 
> but I'm trying to emphasise that a lot depends on which question the 
> attacker is asking.)

Right.
> 
> A powerful attacker might be able to connect to every opennet node 
> simultaneously, in which case the answers to "which files did node y 
> insert/request" also answer "who inserted/requested file x".

Right. But if the opennet is a million nodes, each of which has an uplink of 
100kB/sec and 20 peers (presumably uplink settings being limited by what your 
ISP will tolerate rather than your actual upstream bandwidth), the attacker 
will need on the order of 5GB/sec of bandwidth, and some ridiculously large 
computers to go with it... or a botnet of comparable size to the whole 
Freenet network. On the other hand, on darknet, each connection may cost a 
measurable dollar amount, so it would again be expensive even if the network 
is small. Either way, an adaptive search is much cheaper than a brute force 
search, although connecting to everyone is tempting if you have the 
resources.
> 
> > 2. Easy full solution with large cost:
> > Encrypt the whole splitfile with a random key, or salt the splitfile 
> > encryption key(s) with a random key. This should make life very much 
harder 
> > for an attacker attempting to trace an insert. The problem is it 
eliminates 
> > all space savings from CHK-based splitfiles. This proposal is feasible 
> > immediately.
> 
> Two questions:
> 1) How important is saving space compared to anonymity?

A very good question.

> 2) How much space is actually saved by convergent encryption? 

As the paper argues, the space savings may not be very large. However there 
are special benefits for Freenet e.g. a user may be waiting for a specific 
file, regularly rerequesting it; if another user happens to have it, it would 
be good if the first user would find it immediately and not have to pick up 
the announcement from the second user. Similarly, if a user is able to get 
most of a file, but not the last 20%, he may ask for it to be reinserted; it 
would be best if the reinsert doesn't result in a completely new key, but 
reuses the existing blocks. Obviously a few unusual applications would 
benefit greatly from convergent encryption (e.g. daily system snapshotting).

> To put it  
> another way, how often are large, identical files independently inserted 
> by more than one person? I would guess that this is rare, and will 
> remain rare as long as it's easy for people to find content - nobody 
> will bother inserting a large file if they know it's already available 
> on the network.

Hopefully.
> 
> But using a random key wouldn't defeat the logging attack, so maybe it's 
> a moot point.

No. IMHO making an adaptive search as hard as possible is important.
> 
> Cheers,
> Michael
> 
> * Please don't just say "opennet sucks, use darknet" - everyone is using 
> opennet and will continue to do so until Freenet reaches critical mass 
> (if it ever does), so we need to make opennet secure.

The above attacks are relevant even on darknet, they're just a lot slower and 
more expensive. But a sufficiently powerful and motivated attacker might use 
them against a darknet. An adaptive search is much much cheaper in both the 
case of a large opennet and the case of a small but hard to penetrate 
darknet. Connecting to everyone is tempting but expensive even in the latter 
case, think East Germany!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080324/a6913017/attachment.pgp>

Reply via email to