On Thursday 27 August 2009 18:45:33 Michael Yip wrote: > Hi Ian, > > My name is Michael and for my MSc project, I have to run some > experiments on Freenet to measure and quantify the amount of information > an eavesdropper can get from observing the HTL and key closeness of > requests.
Ooooh, a correlation attack (my peer P looks like he is requesting file X because he has requested a large proportion of the file) or mobile-attacker source tracing? The latter is pretty scary on opennet IMHO. (Read the attacks section in the FAQ) > > I was wondering if you could give me some pointers on my development. > > Basically, to do this, I'm writing a FCP client to upload files to a > node. I'm experiencing difficulties in this. Below is a step by step > view of what I want to achieve: > > 1. Send ClientHello and receive NodeHello reply > 2. Read all the existing Persistent requests > 3. Send my own requests. > > I can't seem to move from step 2 to step 3 as I don't know how many > Persistent requests there are and since most messages end with > EndMessage, I can't use that to determine if that's the end of the list > of Persistent requests. > > How may I achieve this? > > Thank you very much for your kind attention. > > Best regards, > > Michael Yip > MSc Computer Security > University of Birmingham > > > > _______________________________________________ > Devl mailing list > Devl at freenetproject.org > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl > > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 835 bytes Desc: This is a digitally signed message part. URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20090827/39f772cd/attachment.pgp>
