[freenet-support] 0.8

2009-05-21 Thread [Anonymous] Anon User
This is a Type III anonymous message sent you through the Mixminion
server 'pboxlevel3'. If you do not want to receive anonymous messages
through this server, please contact pbox-ad...@winstonsmith.info and
your email address will promptly be added to the list of disallowed
recipients. Please note that the Mixminion anonymity network is
designed in a way such that there is no viable means of tracking the
sender of a message, so blacklisting your address is really the best
_anyone_ can do. Do not reply to this email as it is since its
sender is fictitious and obviously not related to the person who
actually sent the message. To learn more about the experimental
Mixminion network and internet anonymity in general, please start at
http://mixminion.net

-BEGIN TYPE III ANONYMOUS MESSAGE-
Message-type: plaintext

I noticed on the website that you're working towared 0.8 being 
released later this year.  will you be including premix (onion) 
routing in this release?

If not, when do you expect it to be implemented?


-END TYPE III ANONYMOUS MESSAGE-
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] 0.8

2009-05-21 Thread Matthew Toseland
On Monday 18 May 2009 03:12:06 [Anonymous] Anon User wrote:
 
 I noticed on the website that you're working towared 0.8 being 
 released later this year.  will you be including premix (onion) 
 routing in this release?

Maybe. It will probably include Bloom filter sharing. This may or may not 
require encrypted rendezvous tunnels. This is the latest incarnation of the 
premix routing proposal; classic premix onion routing is poor in that it 
costs a lot of hops and gives a very small anonymity set. Encrypted 
rendezvous tunnels are a variation on a proposal in a paper; basically we 
send out a series of anchor requests, which are random routed for some 
distance and then approach a particular location, each has a part of a 
secret, and when enough of them come together on a single node, we put them 
together to create an onion-like encrypted tunnel through the shortest route.

We may however be able to safely implement Bloom filter sharing with only some 
changes to caching - specifically, we would not cache until the HTL reduces 
below some threshold. This solves datastore seizure attacks, although it is 
(still) possible to try to find the circle of nodes several hops away from 
the originator where data was cached when the HTL did fall below the 
threshold. We would probably need to tweak the HTL parameters. At the moment, 
HTL is at the maximum (10) for an average of 10 hops (10% chance of 
decrementing to 9); this is too much if we are not caching the returned data, 
we would probably change the average path length to say 2 (50% chance of 
decrementing), and increase the max HTL to 18 so there is the same number of 
hops overall. The current thinking is that requests would be cached at HTL 16 
or lower and inserts at HTL 14 or lower.

We will try to ensure that 0.8 is no less secure than 0.7. Bloom filter 
sharing should improve performance considerably, but clearly has the 
potential for security issues; we are essentially letting our peers know what 
is in our datastore! But IMHO this is a risk that can be managed - and there 
are some security benefits, e.g. if you can fetch all of a file from your 
trusted darknet peers then an attacker who isn't one of them doesn't get a 
look in.

The bulk flag may be implemented on the 0.8 timescale, it would improve 
performance noticeably and might make requests slightly more distinguishable 
(in that you have a flag indicating whether the requestor wants low latency 
or high throughput); this isn't significant IMHO when considering serious 
attacks. MHKs (top-block redundancy) will definitely be in 0.8, and have no 
security impact afaik. Hopefully we will also include auto-update of plugins 
over Freenet, which should improve security for most people, and make Freenet 
work better in hostile environments.
 
 If not, when do you expect it to be implemented?

If it's not in 0.8 it should be in 0.9. Encrypted tunnels are not inherently a 
really difficult feature, but they will likely require a great deal of tuning 
and similar work related to security/performance tradeoffs. And tunnels will 
likely cost a significant amount of performance. They may only be enabled at 
MAXIMUM security level; there would be little point at NORMAL as Sybil is 
just way too easy on opennet. Of course, by that logic, since almost nobody 
uses darknet, tunnels may never happen ... But we have 6-8 months' funding 
from Google, hopefully we will be able to improve security over this period 
as well as performance and usability.


signature.asc
Description: This is a digitally signed message part.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe