It has been pointed out that attacking opennet is almost trivially easy. 
Comprehensive surveillance of all nodes is feasible on a relatively low budget; 
you can do the math, but even for a big network it's a scarily low number to 
maintain connections to (almost) every node. Even if we find solutions to the 
cheaper attacks, such as denial of service / flooding attacks and mobile 
attacker source tracing (which IMHO we can, although maybe not for big files on 
opennet).

IMHO this is a fundamental weakness of opennet, and is not solvable. However, 
encrypted tunnels might provide a partial solution, at a significant 
performance cost.

Hence:
- We need to solve the security issues with darknet i.e. the Pitch Black 
attack. Oskar has a fair idea how to deal with this but has yet to actually 
come up with a tested algorithm.
- We need to consider ways to limit vulnerabilites on opennet - better 
announcement protocols, possibly encrypted tunnels, etc.
- We need to make darknet actually work - currently load management makes pure 
darknet rather disappointing.
- We need to seriously consider how and whether to migrate to darknet in the 
long run. The current strategy is simply to improve Freenet and get a lot of 
people using it on opennet, and hope that when it is big enough people will 
switch to darknet for more security. But maybe this isn't the right strategy, 
especially if it's a fair assumption that as soon as it gets to be a problem, 
various baddies will be comprehensively watching opennet.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20100831/9d0e3db5/attachment.pgp>

Reply via email to