Re: [freenet-support] Freenet speed local threats

2012-08-02 Thread Matthew Toseland
On Friday 09 Dec 2011 14:48:20 Volodya wrote:
 On 12/09/2011 02:26 PM, Chris wrote:
  I am looking into setting up a distribution where Tor or freenet is used
  to create a secure and anonymous environment for communicating.
 
  One of the issues with freenet is that it is slow. I haven't used it in
  many years and do understand it has gotten much better. I also am aware
  that after a few days it gets faster as popular data is retained and gets
  'cached' on your node and nearby nodes based on what those around you are
  doing.
 
  What I'm trying to figure out is what happens when your node is not on
  24/7 and you can only connect infrequently for several hours at a time.
 
  Many users have a persistent local threat that they need to be aware of.
  Leaving a server running is not an option as it could be compromised by an
  adversary.
 
  Removable media can reduce that threat. What I'm looking to find out is if
  you run a freenode from a removable media and then run a local server
  running freenode to use as one of your peers (which could be on all the
  time) does this post a threat?
 
  If no local server is run that you peer with how is the speed if you only
  connect every few days? Is running freenet for a few hours to several
  hours going to be sufficient or will it be unbearably slow?
 
  With Tor speeds are frequently severely limited. Especially with .onion
  nodes. Some non-onion servers can be accessed with significant speed
  though for sustained periods (15-300... maybe faster).
 
 The bigger problem with Freenet isn't really speed, it's the latency (i.e. how
 long it takes for the data to begin being actually downloaded after request or
 be uploaded after the insert starts). That part gets better if you are 
 connected
 after some time.
 
 Also you didn't state if you are looking for anonymous publishing or anonymous
 downloading. If it's for publishing then Freenet will actually be better than
 Tor for you, since after the user goes offline the content doesn't disappear,
 and the adversary cannot determine the user simply by looking at patterns in 
 the
 accessibility.
 
 However, if you are looking for something which will protect the user, who
 cannot run any software for a long period of time and wants to download the
 material right after going online, then perhaps something like Tor is better 
 (at
 this time).
 
 Of course, what do i know?
 
   - Volodya

The basic problem is if you have a persistent local threat, they will install 
a keylogger and know precisely what you are doing. If you're just worried about 
mum finding some naughty pictures and getting the wrong impression, there are 
various ways to deal with that.


signature.asc
Description: This is a digitally signed message part.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-support] Freenet speed local threats

2012-08-02 Thread Matthew Toseland
On Monday 12 Dec 2011 03:26:50 Chris wrote:
  On Sun, 11 Dec 2011 20:05:36 -0500, Chris wrote:
 
  How would you tell the difference between freenet becoming more
  popular, and the bad guys slowly infiltrating the opennet? Also, you
  assume they only have a few days to perform the attack -- how do you
  know most of the current nodes aren't them right now?
 
 You wouldn't know. But you can't exactly be targeted until you exist.
 Second. There are lots of adversaries. Not all of them are going to be
 targeting you. If the number of nodes is increasing it makes any one
 adversaries job all that much harder to target any one particular user.
 The Tor project has said such before. The more nodes that exist the harder
 certain attacks are to perform. Many of these attacks become apparent too
 if done too quickly. I'm not saying this would work for Freenet. I'm just
 saying it depends on the model and various factors. Freenet is very small.
 So it Tor. If every computer was distributed with Freenet or Tor many of
 these attacks would be much more difficult. Your node should have a choice
 as to who to connect with. If you have enough choice you will be unlikely
 to come across your adversary given a random selection of nodes.

Tor has scalability issues. In principle Freenet should scale better than Tor 
does.

Unfortunately bandwidth is very cheap in quantity. Computing hardware and geeks 
are cheap too. So even with a big network, it's likely that connecting to and 
surveilling every node is going to be feasible for a relatively small cost. And 
in fact a big network would be more likely to contain interesting targets - so 
is more likely to be surveilled than a small network.

This is just the extreme end of opennet attacks though.

There are many cheaper attacks, which are partially explained in the FAQ.
 
  The way to do this really is to monitor the data and figure out what
  the statistics are or have been over time and then base it off this
  information. If there is a change in those statistics it could
  indicate an attack.
 
  This is being done. But it won't help in this case at all. (Even if I
  wanted to dump thousands of bugged nodes into the network, I could
  simply post a Slashdot article, and join that upsurge.)
 
 You could. But then that upsurge would probably make it all the more
 difficult to perform the attack.

For the record your idea of taking stats doesn't work. It doesn't work because 
nodes constantly go online and offline, so you need to constantly add more 
nodes - and many nodes do actually leave for good. It doesn't work because an 
attacker could perfectly well make his nodes behave in the predictable way 
you expect. And above all it doesn't work because routing on opennet is 
dependant on the path folding algorithm, which constantly changes the 
connections to optimise data retrieval. Simply choosing a fixed set of peers at 
install time does not work, especially not if the network is getting bigger. We 
do limit the rate of gaining new connections, but we can't limit it to be so 
slow as to affect an attacker in a big way.

An attacker cannot directly connect to your node, he has to use path folding. 
But there are various attacks that make use of this. The simplest, and most 
expensive - connect to everyone - simply means he has to be a good node. More 
sophisticated, cheaper attacks rely on figuring out, with slowly increasingly 
precision, where a stream of requests are coming from. And yes we have many 
ideas on how to make these attacks much more difficult, especially for inserts 
(which generally are more valuable than requests).
 
 Are you reading what I'm writing? You have to organize first. If you
 haven't organized you can't get the people unbrainwashed. Any revolution
 takes MANY people.

Debatable point in the light of recent events IMHO.
 
 You clearly would prefer to go out in the street and organize. Good luck
 not getting shot.

My brothers and sisters and girlfriends and parents will come after me. When 
they get shot their relatives will come after. When they keep on shooting us we 
just get bigger. And if they still won't give in, and shoot us some more, the 
soldiers start defecting to our side, and we still win.

I'm not saying you don't need organisers. Certainly inspiring voices are 
helpful, and keeping them safe is helpful. But look at what has been achieved 
with essentially traceable, public systems.

IMHO Freenet has limited use in revolutions because the authorities will either 
turn off the internet completely or find some expensive technical way to block 
it which they can get the people to pay for. However, if it is popular, and 
allows people to communicate, it can be very useful, not least for helping 
people to hear voices they wouldn't be able to hear otherwise. China has shown 
it's willing to tolerate criminality as long as it doesn't include dissent - 
there is apparently state-licensed p2p software. This would never happen here 
... 

Re: [freenet-support] Freenet speed local threats

2012-08-02 Thread Matthew Toseland
On Monday 12 Dec 2011 02:24:17 Dennis Nezic wrote:
 On Sun, 11 Dec 2011 20:05:36 -0500, Chris wrote:
   On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
  
   It's not that they think it's hopelessly insecure. It really
   is :p. I mean, it might still be good enough -- but there are
   actual, well-known, unsolvable problems with the opennet idea.
   Which that FAQ should have explained :p.
  
  I'm not arguing it is or isn't. Everything is relative though.
 
 No, everything is not relative :P. Opennet *is* pretty easily
 exploitable by design. This isn't a problem with freenet in particular
 -- but of any untrustworthy network. (Opennet does actually have a
 minimal amount of trust in it -- via the seednodes. But it's easily
 exploitable. A darknet is the way to go. (The only reason why the
 opennet is still around is because people are lazy and complacent.))

It's a specific problem with not being a mixnet. Unfortunately mixnets are 
either not scalable or easily blocked or both. However IMHO Freenet can be 
useful even without being a mixnet.
  
  Nobody is saying you don't need public support (at least until you
  gain power).
 
 It's the first and main thing you need, before you decide to take any
 action. (Unless that action is supposed to persuade them -- which
 anything violent or controversial probably almost certainly won't.)

Hmmm... when was this email written? ;)
 
  If the government is killing off or arresting the organizers then
  gaining popular support is difficult or impossible.
 
 Well, if they're organizing to get the revolution rolling, then of
 course that's an assured fail. If they're organizing to peacefully
 teach people, then yea, arresting those people will hamper things. This
 is where freenet might come in.

What happened in practice is they posted to facebook pages (sometimes in their 
real name, sometimes Facebook turned a blind eye, but it is likely to crack 
down on it now outside of countries where it has no legal exposure and it is 
fashionable not to cooperate with the authorities), they got traced by the 
regime and executed, but then their families came out, along with the families 
of all the people kidnapped and shot by the government at demonstrations...

What you really need in such a communication tool is *popularity*. The problem 
with Facebook is that you are at the whims of a corporation trying to make a 
profit, whose main asset is *your private information*. The problem with 
Freenet is even if we get it working well (and we're a long way off that), if 
it's popular the government will just block it by various rather expensive 
brute-force methods and bill the customers for the oppression.

But generally, the more popular Freenet is, the more useful it is for political 
purposes.

And yes, things like subversive blogs are important. Even in the west, where 
people get fired, prosecuted etc for blogging about work.
 
  The problem is that many people are going to be in great danger as
  they will be physically doing things that might get detected.
 
 People should not be doing things physically, before the philosophy
 is firmly entrenched in the minds of the people. If the people are
 still brainwashed, than any action you take will only make your
 position look worse. First you have to undo their brainwashing.

Hence blogs etc.



signature.asc
Description: This is a digitally signed message part.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-support] Freenet speed local threats

2012-08-02 Thread Matthew Toseland
On Monday 12 Dec 2011 01:05:36 Chris wrote:
 
 If users and organizers are using Tor/freenet/whatever it can be difficult
 to determine who is organizing, who is actively participating, and who is
 just a supporter, or even follower (may be against the revolt). Compared
 to if an organizations members know each other and can be forced to talk.
 A government in power may not have the resources to arrest all using
 Tor/freenet/whatever. That gives the organizers protection (potentially or
 hopefully) long enough to let them carry through from the organization to
 the actual uprising without it's organizers being killed off. Or give them
 opportunity to make mistakes and re-group.

I disagree with most of what you have said. However, the above is more or less 
on target. You need a lot of people using Freenet who aren't interested in 
political activism, who are just using it to talk to their friends, share files 
etc. Then all your Friends can be people you know (so darknet is feasible), and 
yet they're not all part of your guerilla cell.

Also, any good movement needs martyrs.

Finally ... look at what people actually used ... Facebook!


signature.asc
Description: This is a digitally signed message part.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Dennis Nezic
On Sun, 11 Dec 2011 01:04:09 -0500, Chris wrote:
 [...]
 I would put money on them taking advantage of zero day exploits
 and/or the courts to force the Tor project, the Freenet project, the
 i2p project, or any other similar project to modify the code and
 insert a back door. Germany did this many years ago with one project
 and successfully identified a user. It was none of the above projects
 although the ability to force upon developers code changes that go
 out to all users has occurred. They were targeting one individual too
 that appeared to be a fairly low-value target. The only thing that
 might stop this from happening to other projects is where the
 developers are operating in one country and the government attempting
 to force the change is in another.

Another thing that might stop this from happening is open source
software, and at least a bunch of coders reviewing and signing any code
before it gets released. (I'm actually not sure how many coders have to
currently sign -- surely it's not just Toad?)

Do you have a link or more info on that German case? Was it open-source
software? Did the developer willingly co-operate, or did they use some
kind of backwards legal mechanism to force him? I wonder how much I can
buy Toad for. Everyone has a price ;-).


  The whole point of opennet is to be able to connect to anybody you
  want :P. And if your ISP is compromised, this becomes even more
  trivial -- they can block all but their own seednodes, so you're
  forced to only connect to their bugged nodes as peers.
 
 This should become apparent to the user

How would you propose to differentiate between a bugged node and a
normal node?

 and if is not made apparent that is a problem with freenet (or
 whichever project you would be suggesting).

Yes it is. And that's why it's in the FAQ :p. You should take a bit
more time, and read it more carefully:

Combined with harvesting and adaptive search attacks, [the
bootstrapping attack] explains why opennet is regarded by many
core developers as hopelessly insecure. If you want good security you
need to connect only to friends.


  [...]
  In darknet, you *explicitly* specify who to connect to (hopefully a
  trusted friend), and you don't connect to anybody else. So, to
  infiltrate this setup, the bad guys would have to physically
  compromise your friends' nodes, one by one. To infiltrate opennet,
  they just have to type on a keyboard in the comfort of their homes.
 
 If you could trust your friends there wouldn't be any need for
 freenet. The problem is you can't trust anybody.

If you can't trust anybody, then what do you hope to achieve? Who do
you hope to communicate with -- if everyone is your enemy?
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Chris
 On Sun, 11 Dec 2011 01:04:09 -0500, Chris wrote:
 [...]
 I would put money on them taking advantage of zero day exploits
 and/or the courts to force the Tor project, the Freenet project, the
 i2p project, or any other similar project to modify the code and
 insert a back door. Germany did this many years ago with one project
 and successfully identified a user. It was none of the above projects
 although the ability to force upon developers code changes that go
 out to all users has occurred. They were targeting one individual too
 that appeared to be a fairly low-value target. The only thing that
 might stop this from happening to other projects is where the
 developers are operating in one country and the government attempting
 to force the change is in another.

 Another thing that might stop this from happening is open source
 software, and at least a bunch of coders reviewing and signing any code
 before it gets released. (I'm actually not sure how many coders have to
 currently sign -- surely it's not just Toad?)

It mitigates it to a degree although the concern still exists. For a few
reasons. The party who distributes the binary is going to be ordered not
to reveal the modifications. The main page/download page isn't going to
warn users and that is likely the only information they are going to see
before updating. It becomes newsworthy information though so there is a
slight chance a user who keeps up on this stuff would notice prior to
installation.

The court could order the source code not be released for the new binary
too. At least not the code that matches the new binary. Then users would
need to actually notice the binary differs from the source code and
disassemble it to find the bug. How many users actually compile it
themselves? How many examine the diffs?


 Do you have a link or more info on that German case? Was it open-source
 software? Did the developer willingly co-operate, or did they use some
 kind of backwards legal mechanism to force him? I wonder how much I can
 buy Toad for. Everyone has a price ;-).


JAP. Here is some more info on it:

http://smokeys.wordpress.com/tag/java-anonymous-proxy/

This may be the most serious breach I have ever heard of with any software
and could potentially threaten other projects. The danger was detected
right away as the softwares source code was available. Many users updated
and were compromised before they became aware of this though. In this
instance they were targeting a particular individual although compromised
every user of the service. The individual they caught may not have been
the same person they were targeting. This is a risk with mass
surveillance/search/DNA...


  The whole point of opennet is to be able to connect to anybody you
  want :P. And if your ISP is compromised, this becomes even more
  trivial -- they can block all but their own seednodes, so you're
  forced to only connect to their bugged nodes as peers.

 This should become apparent to the user

 How would you propose to differentiate between a bugged node and a
 normal node?

This is why you have authentication and checks against any inability to
connect to nodes.

You are looking at the issue wrong. It doesn't matter which nodes are
bugged. If a user can't connect to higher than normal percentage of nodes
it should send up a red flag for one.

You can keep track of nodes as well and check out which nodes are new and
which have been added over time. The number of new nodes coming online
shouldn't exceed a certain threshold. If there are 5,000 and on average
the number of nodes increase by 2 a week then 100 new nodes coming online
should send up a red flag. I don't know what the actual numbers are or the
range. Maybe some weeks do see 100 nodes and others only 2. There is
probably a number though that could increase the time it takes to pull off
such an attack.

I realize you do not have thousands of peers with freenet. This is just an
example of how the difficulty of an attack may be reduced with some
designs.


 and if is not made apparent that is a problem with freenet (or
 whichever project you would be suggesting).

 Yes it is. And that's why it's in the FAQ :p. You should take a bit
 more time, and read it more carefully:

 Combined with harvesting and adaptive search attacks, [the
 bootstrapping attack] explains why opennet is regarded by many
 core developers as hopelessly insecure. If you want good security you
 need to connect only to friends.


I don't think you understand how it works that well. I suspect if some of
your friends are compromised you won't be. I'm not reading this bootstrap
attack as you understand it. I don't doubt that some developers think
opennet mode is hopelessly insecure.


  [...]
  In darknet, you *explicitly* specify who to connect to (hopefully a
  trusted friend), and you don't connect to anybody else. So, to
  infiltrate this setup, the bad guys would have to physically
  compromise your friends' nodes, one by one. To 

Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Dennis Nezic
On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
 How many users actually compile it themselves?

Me, and all other Gentoo users :-).

 How many examine the diffs?

I do, rarely :s.


  [...]
  How would you propose to differentiate between a bugged node and a
  normal node?
 
 This is why you have authentication and checks against any inability
 to connect to nodes.

There is no such authentication that would help here. And you would be
able to connect to any node normally -- except the compromised nodes
would still find a way to become your peers and surround you. (I'm not
sure exactly what criteria need to be met for your node to accept
a stranger's offer, but I'm sure a dedicated adversary can easily meet
them.)

 You are looking at the issue wrong. It doesn't matter which nodes are
 bugged. If a user can't connect to higher than normal percentage of
 nodes it should send up a red flag for one.

They will be able to.

 You can keep track of nodes as well and check out which nodes are new
 and which have been added over time. The number of new nodes coming
 online shouldn't exceed a certain threshold. If there are 5,000 and
 on average the number of nodes increase by 2 a week then 100 new
 nodes coming online should send up a red flag. I don't know what the
 actual numbers are or the range. Maybe some weeks do see 100 nodes
 and others only 2. There is probably a number though that could
 increase the time it takes to pull off such an attack.

There is no such metric -- a slashdot article, for example, could
easily trigger such a gauge. Moreover, you're not understanding the
attack enough -- the bad guys don't need to control too many bugged
nodes -- just a few which they will find a way to peer with you.

By the way, here is one freesite that tries to measure how many nodes
are on the network:
  
USK@85gZTCiQO9IEPDAGvjktO9d-ZMS1lIABR6JB85m4ens,VGDItiCVzCcWAay51faZzcIfAepzeHpzXYvChlueWYE,AQACAAE/stats/1533/


  and if is not made apparent that is a problem with freenet (or
  whichever project you would be suggesting).
 
  Yes it is. And that's why it's in the FAQ :p. You should take a bit
  more time, and read it more carefully:
 
  Combined with harvesting and adaptive search attacks, [the
  bootstrapping attack] explains why opennet is regarded by many
  core developers as hopelessly insecure. If you want good security
  you need to connect only to friends.
 
 I don't think you understand how it works that well. I suspect if
 some of your friends are compromised you won't be.

Did you even read the Correlation attacks subsection, from
http://freenetproject.org/faq.html#attack ?


 I don't doubt that some developers think opennet mode is hopelessly
 insecure.

It's not that they think it's hopelessly insecure. It really is :p. I
mean, it might still be good enough -- but there are actual,
well-known, unsolvable problems with the opennet idea. Which that FAQ
should have explained :p.


 I think the best way to organize a revolt or guerrilla war fare in
 todays world would probably be to anonymously organize multiple small
 groups.

I strongly disagree. The battle (no matter which one you pick,
probably) is ultimately in the minds of the boring violence-phobic
masses -- the majorities. If you don't have popular support, you're
doomed no matter what you try to do. The best way to organize a revolt
is to talk to your friends and family and convince them peacefully and
rationally. (And freenet is a great tool for this! :D.)
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Chris
 On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
 How many users actually compile it themselves?

 Me, and all other Gentoo users :-).

 How many examine the diffs?

 I do, rarely :s.


  [...]
  How would you propose to differentiate between a bugged node and a
  normal node?

 This is why you have authentication and checks against any inability
 to connect to nodes.

 There is no such authentication that would help here. And you would be
 able to connect to any node normally -- except the compromised nodes
 would still find a way to become your peers and surround you. (I'm not
 sure exactly what criteria need to be met for your node to accept
 a stranger's offer, but I'm sure a dedicated adversary can easily meet
 them.)

I think you are wrong here. I think authentication could work to a degree
provided certain conditions are true/consistent enough. I am assuming
certain things such as there being enough nodes that come online daily and
stay online permanently. It may not work if the number of nodes which come
online and then go offline is high. I'm no expert here although in theory
you should be able to use authentication to verify that old nodes are
still under the control of the person they were under prior. Chances are
the initial nodes you trust aren't going to be compromised by your
adversary.

The adversary would have to slowly bring on new nodes then and would be
limited to a particular number of nodes per day (however many is typical).
If they try bringing on too many new nodes at once an alert should go up.

For instance say there are 5000 nodes already, and there are never more
than 20 new nodes that come on per day then the adversary would need 8
months to add 5000 nodes. If they brought on 40 nodes a day it would be
apparent that an attack was underway.

The way to do this really is to monitor the data and figure out what the
statistics are or have been over time and then base it off this
information. If there is a change in those statistics it could indicate an
attack.


 You are looking at the issue wrong. It doesn't matter which nodes are
 bugged. If a user can't connect to higher than normal percentage of
 nodes it should send up a red flag for one.

 They will be able to.

They will be able to what?


 You can keep track of nodes as well and check out which nodes are new
 and which have been added over time. The number of new nodes coming
 online shouldn't exceed a certain threshold. If there are 5,000 and
 on average the number of nodes increase by 2 a week then 100 new
 nodes coming online should send up a red flag. I don't know what the
 actual numbers are or the range. Maybe some weeks do see 100 nodes
 and others only 2. There is probably a number though that could
 increase the time it takes to pull off such an attack.

 There is no such metric -- a slashdot article, for example, could
 easily trigger such a gauge. Moreover, you're not understanding the
 attack enough -- the bad guys don't need to control too many bugged
 nodes -- just a few which they will find a way to peer with you.

 By the way, here is one freesite that tries to measure how many nodes
 are on the network:
   
 USK@85gZTCiQO9IEPDAGvjktO9d-ZMS1lIABR6JB85m4ens,VGDItiCVzCcWAay51faZzcIfAepzeHpzXYvChlueWYE,AQACAAE/stats/1533/


  and if is not made apparent that is a problem with freenet (or
  whichever project you would be suggesting).
 
  Yes it is. And that's why it's in the FAQ :p. You should take a bit
  more time, and read it more carefully:
 
  Combined with harvesting and adaptive search attacks, [the
  bootstrapping attack] explains why opennet is regarded by many
  core developers as hopelessly insecure. If you want good security
  you need to connect only to friends.

 I don't think you understand how it works that well. I suspect if
 some of your friends are compromised you won't be.

 Did you even read the Correlation attacks subsection, from
 http://freenetproject.org/faq.html#attack ?

Yes. I get the jist of it.



 I don't doubt that some developers think opennet mode is hopelessly
 insecure.

 It's not that they think it's hopelessly insecure. It really is :p. I
 mean, it might still be good enough -- but there are actual,
 well-known, unsolvable problems with the opennet idea. Which that FAQ
 should have explained :p.

I'm not arguing it is or isn't. Everything is relative though.



 I think the best way to organize a revolt or guerrilla war fare in
 todays world would probably be to anonymously organize multiple small
 groups.

 I strongly disagree. The battle (no matter which one you pick,
 probably) is ultimately in the minds of the boring violence-phobic
 masses -- the majorities. If you don't have popular support, you're
 doomed no matter what you try to do. The best way to organize a revolt
 is to talk to your friends and family and convince them peacefully and
 rationally. (And freenet is a great tool for this! :D.)

Nobody is saying you don't need public support (at least until you gain

Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Dennis Nezic
On Sun, 11 Dec 2011 20:05:36 -0500, Chris wrote:
  On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
  How many users actually compile it themselves?
 
  Me, and all other Gentoo users :-).
 
  How many examine the diffs?
 
  I do, rarely :s.
 
 
   [...]
   How would you propose to differentiate between a bugged node and
   a normal node?
 
  This is why you have authentication and checks against any
  inability to connect to nodes.
 
  There is no such authentication that would help here. And you would
  be able to connect to any node normally -- except the compromised
  nodes would still find a way to become your peers and surround you.
  (I'm not sure exactly what criteria need to be met for your node to
  accept a stranger's offer, but I'm sure a dedicated adversary can
  easily meet them.)
 
 I think you are wrong here. I think authentication could work to a
 degree provided certain conditions are true/consistent enough. I am
 assuming certain things such as there being enough nodes that come
 online daily and stay online permanently. It may not work if the
 number of nodes which come online and then go offline is high. I'm no
 expert here although in theory you should be able to use
 authentication to verify that old nodes are still under the control
 of the person they were under prior. Chances are the initial nodes
 you trust aren't going to be compromised by your adversary.

First of all, on opennet, the peers you are connected to change every
few minutes/hours. They are not static. They constantly change to make
routing more efficient, via swapping. I was not suggesting the bad
guys actually compromise other people's nodes -- the far easier and
more likely scenario is they simply have *their own bugged nodes*, and
try to become your peer. (And I think, (not absolutely sure), for a
dedicated attacker, this is pretty easy.)


 The adversary would have to slowly bring on new nodes then and would
 be limited to a particular number of nodes per day (however many is
 typical). If they try bringing on too many new nodes at once an alert
 should go up.

So, again, *their nodes* (just a few... 10-20?) will initiate peering
with your node. And there is nothing you or anyone can do about it.
This is the problem with connecting to strangers -- ie. opennet.

Although, I guess this can be (already is?) mitigated somewhat if we
only allow a certain percentage of our peers to come from external
(swap, etc) requests -- but then it would simply become a question of
time before you initiate peering with their nodes -- and they will have
many, including big and popular seednodes.


 For instance say there are 5000 nodes already, and there are never
 more than 20 new nodes that come on per day then the adversary would
 need 8 months to add 5000 nodes. If they brought on 40 nodes a day it
 would be apparent that an attack was underway.

How would you tell the difference between freenet becoming more
popular, and the bad guys slowly infiltrating the opennet? Also, you
assume they only have a few days to perform the attack -- how do you
know most of the current nodes aren't them right now?


 The way to do this really is to monitor the data and figure out what
 the statistics are or have been over time and then base it off this
 information. If there is a change in those statistics it could
 indicate an attack.

This is being done. But it won't help in this case at all. (Even if I
wanted to dump thousands of bugged nodes into the network, I could
simply post a Slashdot article, and join that upsurge.)


  You are looking at the issue wrong. It doesn't matter which nodes
  are bugged. If a user can't connect to higher than normal
  percentage of nodes it should send up a red flag for one.
 
  They will be able to.
 
 They will be able to what?

They will be able to connect to normal nodes too. Of course, from your
perspective, they're *all* equal strangers. (On opennet.)


  I don't doubt that some developers think opennet mode is hopelessly
  insecure.
 
  It's not that they think it's hopelessly insecure. It really
  is :p. I mean, it might still be good enough -- but there are
  actual, well-known, unsolvable problems with the opennet idea.
  Which that FAQ should have explained :p.
 
 I'm not arguing it is or isn't. Everything is relative though.

No, everything is not relative :P. Opennet *is* pretty easily
exploitable by design. This isn't a problem with freenet in particular
-- but of any untrustworthy network. (Opennet does actually have a
minimal amount of trust in it -- via the seednodes. But it's easily
exploitable. A darknet is the way to go. (The only reason why the
opennet is still around is because people are lazy and complacent.))


  I think the best way to organize a revolt or guerrilla war fare in
  todays world would probably be to anonymously organize multiple
  small groups.
 
  I strongly disagree. The battle (no matter which one you pick,
  probably) is ultimately in the minds of the boring 

Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Chris
 On Sun, 11 Dec 2011 20:05:36 -0500, Chris wrote:
  On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
  How many users actually compile it themselves?
 
  Me, and all other Gentoo users :-).
 
  How many examine the diffs?
 
  I do, rarely :s.
 
 
   [...]
   How would you propose to differentiate between a bugged node and
   a normal node?
 
  This is why you have authentication and checks against any
  inability to connect to nodes.
 
  There is no such authentication that would help here. And you would
  be able to connect to any node normally -- except the compromised
  nodes would still find a way to become your peers and surround you.
  (I'm not sure exactly what criteria need to be met for your node to
  accept a stranger's offer, but I'm sure a dedicated adversary can
  easily meet them.)

 I think you are wrong here. I think authentication could work to a
 degree provided certain conditions are true/consistent enough. I am
 assuming certain things such as there being enough nodes that come
 online daily and stay online permanently. It may not work if the
 number of nodes which come online and then go offline is high. I'm no
 expert here although in theory you should be able to use
 authentication to verify that old nodes are still under the control
 of the person they were under prior. Chances are the initial nodes
 you trust aren't going to be compromised by your adversary.

 First of all, on opennet, the peers you are connected to change every
 few minutes/hours. They are not static. They constantly change to make
 routing more efficient, via swapping. I was not suggesting the bad
 guys actually compromise other people's nodes -- the far easier and
 more likely scenario is they simply have *their own bugged nodes*, and
 try to become your peer. (And I think, (not absolutely sure), for a
 dedicated attacker, this is pretty easy.)


 The adversary would have to slowly bring on new nodes then and would
 be limited to a particular number of nodes per day (however many is
 typical). If they try bringing on too many new nodes at once an alert
 should go up.

 So, again, *their nodes* (just a few... 10-20?) will initiate peering
 with your node. And there is nothing you or anyone can do about it.
 This is the problem with connecting to strangers -- ie. opennet.

 Although, I guess this can be (already is?) mitigated somewhat if we
 only allow a certain percentage of our peers to come from external
 (swap, etc) requests -- but then it would simply become a question of
 time before you initiate peering with their nodes -- and they will have
 many, including big and popular seednodes.


 For instance say there are 5000 nodes already, and there are never
 more than 20 new nodes that come on per day then the adversary would
 need 8 months to add 5000 nodes. If they brought on 40 nodes a day it
 would be apparent that an attack was underway.

 How would you tell the difference between freenet becoming more
 popular, and the bad guys slowly infiltrating the opennet? Also, you
 assume they only have a few days to perform the attack -- how do you
 know most of the current nodes aren't them right now?

You wouldn't know. But you can't exactly be targeted until you exist.
Second. There are lots of adversaries. Not all of them are going to be
targeting you. If the number of nodes is increasing it makes any one
adversaries job all that much harder to target any one particular user.
The Tor project has said such before. The more nodes that exist the harder
certain attacks are to perform. Many of these attacks become apparent too
if done too quickly. I'm not saying this would work for Freenet. I'm just
saying it depends on the model and various factors. Freenet is very small.
So it Tor. If every computer was distributed with Freenet or Tor many of
these attacks would be much more difficult. Your node should have a choice
as to who to connect with. If you have enough choice you will be unlikely
to come across your adversary given a random selection of nodes.



 The way to do this really is to monitor the data and figure out what
 the statistics are or have been over time and then base it off this
 information. If there is a change in those statistics it could
 indicate an attack.

 This is being done. But it won't help in this case at all. (Even if I
 wanted to dump thousands of bugged nodes into the network, I could
 simply post a Slashdot article, and join that upsurge.)

You could. But then that upsurge would probably make it all the more
difficult to perform the attack.



  You are looking at the issue wrong. It doesn't matter which nodes
  are bugged. If a user can't connect to higher than normal
  percentage of nodes it should send up a red flag for one.
 
  They will be able to.

 They will be able to what?

 They will be able to connect to normal nodes too. Of course, from your
 perspective, they're *all* equal strangers. (On opennet.)

They aren't equal. Not really. You should be able to identify a node you

Re: [freenet-support] Freenet speed local threats

2011-12-11 Thread Dennis Nezic
On Sun, 11 Dec 2011 22:26:50 -0500, Chris wrote:
 [...]
 If you go out and publicly denounce a rouge government you are liable
 to get yourself shot long before you have any chance to gather
 support. The Internet is a great platform to anonymously gather
 support. When everybody comes out at once to support a cause you
 won't be shot. There will be too many others for them to notice.

This is why I specifically said that your friends and family are where
the battle is really at -- not some impersonal public demonstration in
front of the bad guys' palace. (If your friends are online, then
Freenet is useful. If you expect to teach online strangers, then I
believe you will probably fail. Speaking from (extensive!) personal
experience :p.)

I don't believe rogue governments exist. They are all supported by
the majority -- probably via ignorance -- but supported nonetheless.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] Freenet speed local threats

2011-12-10 Thread Dennis Nezic
On Fri, 9 Dec 2011 17:29:33 -0500, Chris wrote:
  [...]
  Many users have a persistent local threat that they need to be
  aware of. Leaving a server running is not an option as it could be
  compromised by an adversary.
 
  Removable media can reduce that threat.
  [...]
 
 I was not referring to zero day exploits actually. The key word here
 was local real-world threats. Such as an adversary gaining physical
 access to the server/machine running freenode.

If the bad guys have physical access, and care, it's game over.

I suppose you can try setting secret tripwires that might notify you
if the machine was tampered with (both in software, and in hardware.)
Those might give you a fighting chance. Although you'll also need to
make sure your room wasn't bugged with pin-hole cameras and other
spy-ware. It's a lost battle, regardless.

 Removable media may not eliminate the threat although there is less
 opertunity for a more sophisticated targeted attack. A software
 keylogger inserted into the MBR or similar would not be possible if
 the boot medium is never available to the attacker.

But it will be available if you ever decide to boot, happily recording
everything. Again, if you think your machine was actually tampered
with, you should assume it's unusable.

 On the other hand a physical keylogger may still be possible and maybe
 even a software based keylogger although more difficult to
 disguise/install without being noticed.

Of course. You should expect a variety of key loggers installed, in
code, under your keyboard keys, acoustic key loggers stuck somewhere
inside the machine (that can acoustically determine which key you're
pressing), and a bunch throughout your room in pin holes in your walls
and ceiling.

 I can think of at least a few different ways of getting a keylogger
 onto a system without having access to the boot drive or having to
 install a physical device. I would still need physical access to the
 computer. At least one method would not even require BIOS
 modification and would work on any x86 machine.

So you're already aware that there is not much hope if the bad guys get
physical access? :p

 [...]
 Lets give a scenario:
 
 We have to assume that a persons Internet connection is being
 monitored. This might be via a sophisticated non-governmental actor
 (such as by breaking WEP/WPA) or by a government act such as
 monitoring at the telco. The adversary should also be assumed to be
 unethical in that there are no rules

In that case, if you're using only opennet-mode, you should assume
you're screwed :p. They can replace all your opennet peered nodes, and
see exactly what you're doing, more or less. This is why darknet-mode
was created -- they would need to physically infiltrate all your
friend's computers, which isn't impossible, but MUCH more difficult.

 and can physically modify or otherwise install a software based
 monitoring solution on any boot media they have access to.

Then you're *definitely* screwed, regardless, as explained above.


 The first question is how many peers need to be compromised to
 identify the content being transmitted?

All of them, to be 100% sure. Compromising opennet peers is trivial --
with a dedicated-enough adversary. Compromising darknet is a lot
harder.


 If a few of your freenode peers can be compromised and the adversary
 can monitor your Internet connection and local area network can they
 identify the contents which are being requested/sent by you? This
 assumes that they can't bug the physical machine that you are using
 to run freenode.

As long as you still have one uncompromised peer, I guess they can't be
sure what traffic you're generating locally, and what you're simply
relaying for that peer (or that peer's peers, etc). But if they're able
to compromise all-but-one of your peers, it's pretty darn close to
game-over :p. If I was an unethical bad guy, I'd arrest you and that
peer, separate you into isolation-cells, and play psychological games
until one of you confesses. Or perhaps torture. (Although, if that
other peer doesn't have anything to hide, or isn't your friend, I'd
easily jump to the conclusion that you're the one I'm looking for :).


 If you add a server with freenode (which can be bugged) to your local
 LAN that is then added as one of your peers does this compromise the
 security? The point of adding a server with freenode to peer with on
 the local LAN would be to speed up requests since the machine that is
 actually used for browsing freesites (such as a laptop) can't be left
 on all the time (as doing so gives an adversary opportunity to bug
 it). This means it has to run from a removable boot medium that can
 be accounted for at all times.

Overlooking the above points about physically-tampered machines (we
*really* shouldn't overlook them), I think this setup essentially means
that you can expect one of your lan peers to be compromised. But, as
long as your router isn't bugged, and as long as that peer isn't the

Re: [freenet-support] Freenet speed local threats

2011-12-10 Thread Dennis Nezic
On Sat, 10 Dec 2011 20:06:10 -0500, Chris wrote:
  On Fri, 9 Dec 2011 17:29:33 -0500, Chris wrote:
   [...]
   Many users have a persistent local threat that they need to be
   aware of. Leaving a server running is not an option as it could
   be compromised by an adversary.
  
   Removable media can reduce that threat.
   [...]
 
  I was not referring to zero day exploits actually. The key word
  here was local real-world threats. Such as an adversary gaining
  physical access to the server/machine running freenode.
 
  If the bad guys have physical access, and care, it's game over.
 
  I suppose you can try setting secret tripwires that might notify you
  if the machine was tampered with (both in software, and in
  hardware.) Those might give you a fighting chance. Although you'll
  also need to make sure your room wasn't bugged with pin-hole
  cameras and other spy-ware. It's a lost battle, regardless.
 
 This is completely dependent on who the adversary is, the level of
 sophistication, mistakes they may make, the resources they may have,
 how badly they want you, what they know about you, and what other
 precautions have been taken. A pin-hole camera for instance should
 not be enough to compromise a good setup.

How do you figure? (The camera can see everything you're typing and
your screen, right? If you have any additional biometric login
requirements, they can easily be gotten from you later.)


 Nor should a MBR level key logger installation. These two things are
 easier to do than a BIOS level modification. A BIOS level
 modification gets a lot more complicated as each system uses a
 different BIOS. When there is no generic solution to a problem or
 that solution is more cumbersome it may not exist. If it does exist
 it may be used much more selectively and there will almost certainly
 be fewer adversaries who have access to it. You may not be a target
 of a significantly high level adversary (where such levels may exist).
 
 
  Removable media may not eliminate the threat although there is less
  opertunity for a more sophisticated targeted attack. A software
  keylogger inserted into the MBR or similar would not be possible if
  the boot medium is never available to the attacker.
 
  But it will be available if you ever decide to boot, happily
  recording everything.
 
 If the adversary does not have access to your boot medium how do you
 think they are going to install it? When you do boot it should not
 exist. There are few places that a keylogger or device can be
 installed. BIOS, optical drive, USB port, PC card slot, firewire,
 network etc. These are all things that can be checked. The only
 exception is the BIOS. The BIOS differs from machine to machine which
 should increase the cost of the adversary to produce a solution. I
 have never heard of a BIOS level bug. There have been conceptual
 modifications to suggest it may be possible although nothing in
 practice to show it could be done easily.
 
 Again, if you think your machine was actually tampered
  with, you should assume it's unusable.
 
 Nobody is arguing that a knowingly compromised machine or one that
 there is reason to suspect could have been compromised should be used.

But any machine that the adversary has physical access to should be
suspected to have been compromised. A BIOS-level bug, as you explain,
is one great way. Personally, I would prefer lower-tech spy solutions.
Of course, you can assume your adversary is weak, but that's a risky
assumption.


  On the other hand a physical keylogger may still be possible and
  maybe even a software based keylogger although more difficult to
  disguise/install without being noticed.
 
  Of course. You should expect a variety of key loggers installed, in
  code, under your keyboard keys, acoustic key loggers stuck somewhere
  inside the machine (that can acoustically determine which key you're
  pressing), and a bunch throughout your room in pin holes in your
  walls and ceiling.
 
 None of which can't be avoided. As far as I know.

Please explain.


  I can think of at least a few different ways of getting a keylogger
  onto a system without having access to the boot drive or having to
  install a physical device. I would still need physical access to
  the computer. At least one method would not even require BIOS
  modification and would work on any x86 machine.
 
  So you're already aware that there is not much hope if the bad guys
  get physical access? :p
 
 I disagree. Most bad guys aren't as sophisticated as one might
 think. Including the ones coding the bugs and exploits used. They
 will create a bug and assume it works. In reality it only works if x,
 y, and z are true. Provided you have taken sufficient precautions
 this rarely is the case. Most adversaries need not be sophisticated
 at all. They merely need to carry out a set of instructions found
 somewhere. Be it they ordered a physical keylogger online or followed
 an instruction set of procedures that works for 

Re: [freenet-support] Freenet speed local threats

2011-12-10 Thread Chris
 On Sat, 10 Dec 2011 20:06:10 -0500, Chris wrote:
  On Fri, 9 Dec 2011 17:29:33 -0500, Chris wrote:
   [...]
   Many users have a persistent local threat that they need to be
   aware of. Leaving a server running is not an option as it could
   be compromised by an adversary.
  
   Removable media can reduce that threat.
   [...]
 
  I was not referring to zero day exploits actually. The key word
  here was local real-world threats. Such as an adversary gaining
  physical access to the server/machine running freenode.
 
  If the bad guys have physical access, and care, it's game over.
 
  I suppose you can try setting secret tripwires that might notify you
  if the machine was tampered with (both in software, and in
  hardware.) Those might give you a fighting chance. Although you'll
  also need to make sure your room wasn't bugged with pin-hole
  cameras and other spy-ware. It's a lost battle, regardless.

 This is completely dependent on who the adversary is, the level of
 sophistication, mistakes they may make, the resources they may have,
 how badly they want you, what they know about you, and what other
 precautions have been taken. A pin-hole camera for instance should
 not be enough to compromise a good setup.

 How do you figure? (The camera can see everything you're typing and
 your screen, right? If you have any additional biometric login
 requirements, they can easily be gotten from you later.)

Where exactly is this camera placed? This is dependent on the user being
position such that a camera can see the keyboard.


 Nor should a MBR level key logger installation. These two things are
 easier to do than a BIOS level modification. A BIOS level
 modification gets a lot more complicated as each system uses a
 different BIOS. When there is no generic solution to a problem or
 that solution is more cumbersome it may not exist. If it does exist
 it may be used much more selectively and there will almost certainly
 be fewer adversaries who have access to it. You may not be a target
 of a significantly high level adversary (where such levels may exist).

 
  Removable media may not eliminate the threat although there is less
  opertunity for a more sophisticated targeted attack. A software
  keylogger inserted into the MBR or similar would not be possible if
  the boot medium is never available to the attacker.
 
  But it will be available if you ever decide to boot, happily
  recording everything.

 If the adversary does not have access to your boot medium how do you
 think they are going to install it? When you do boot it should not
 exist. There are few places that a keylogger or device can be
 installed. BIOS, optical drive, USB port, PC card slot, firewire,
 network etc. These are all things that can be checked. The only
 exception is the BIOS. The BIOS differs from machine to machine which
 should increase the cost of the adversary to produce a solution. I
 have never heard of a BIOS level bug. There have been conceptual
 modifications to suggest it may be possible although nothing in
 practice to show it could be done easily.

 Again, if you think your machine was actually tampered
  with, you should assume it's unusable.

 Nobody is arguing that a knowingly compromised machine or one that
 there is reason to suspect could have been compromised should be used.

 But any machine that the adversary has physical access to should be
 suspected to have been compromised. A BIOS-level bug, as you explain,
 is one great way. Personally, I would prefer lower-tech spy solutions.
 Of course, you can assume your adversary is weak, but that's a risky
 assumption.

If I'm the adversary the question becomes how do I go about producing a
bug for every machine that I might come across that I would like to bug?
Porting BIOS modifications from one motherboard to another is a
non-trivial task and would be prohibitively expensive. Probably even for
the wealthiest nations on earth. There are easier ways to bug that .0001%
of the population who might have a bug-resistant setup. Of that .0001%
there are probably a handful currently whom a BIOS level bug would be
needed.

There are projects out there to port an open source BIOS and there are at
best 100 boards which are supported. Of that there are just 5 laptops. If
you think 5 models is a lot think again. Of any specific laptop it takes a
specific revision of that laptop. This is a project which has bee around
for many many many years with financial support from governments and
corporations.

Even if we assume the governments have access to the original source code
to every BIOS (which you would have to have one for each model and
revision of every laptop) it is still going to be expensive. Who are you
that the government is going to have the technical persons on hand to
arrange and have modified and then secretly install such a BIOS?

I would put money on them taking advantage of zero day exploits and/or the
courts to force the Tor project, the Freenet project, the 

Re: [freenet-support] Freenet speed local threats

2011-12-09 Thread Dennis Nezic
On Fri, 9 Dec 2011 05:26:19 -0500, Chris wrote:
 I am looking into setting up a distribution where Tor or freenet is
 used to create a secure and anonymous environment for communicating.

Very cool. I've done that too :-).

 One of the issues with freenet is that it is slow. I haven't used it
 in many years and do understand it has gotten much better. I also am
 aware that after a few days it gets faster as popular data is
 retained and gets 'cached' on your node and nearby nodes based on
 what those around you are doing.
 
 What I'm trying to figure out is what happens when your node is not on
 24/7 and you can only connect infrequently for several hours at a
 time.

It runs at esssentially the same speed (minus the benefits of immediate
local caching, of course) -- which is pretty slow but manageable. It
may take a few seconds / a minute longer to fetch things, but that's
still a minute longer than the censored web provides, so either way
users will have to adjust their expectations. Booting into the network
will also take an additional minute or so, which always-on nodes don't
have to worry about.

 Many users have a persistent local threat that they need to be aware
 of. Leaving a server running is not an option as it could be
 compromised by an adversary.
 
 Removable media can reduce that threat.

The keyword being *reduce* :p. We all have that concern and fear, of
unforeseen zero-day linux exploits, etc. (We already know they exist in
Window$ :). Ideally you would want to make extra sure you have enough
contingency planning (proper permissioning / stable and patched
software / firewalls / perhaps caged virtual machines / sentry
programs / whatever your paranoia desires), so such fears are
minimized. They will never be eliminated though.

 What I'm looking to find out is if you run a freenode from a
 removable media and then run a local server running freenode to use
 as one of your peers (which could be on all the time) does this post
 a threat?

Besides the obvious risks of either of those machines being compromised
(by any number of ways: physically, buggy software, leaky software,
etc), traffic analysis will always be a threat with Tor, and also with
Freenet if bad guys have somehow managed to occupy all your peer
connections. But besides these well known threats, I think it's pretty
safe. But not perfectly safe.

 If no local server is run that you peer with how is the speed if you
 only connect every few days? Is running freenet for a few hours to
 several hours going to be sufficient or will it be unbearably slow?

It's bearable. (After it takes a few minutes to connect to the
network.) I suppose it's similar to fetching a freesite you never
fetched before -- perhaps a bit faster.

 With Tor speeds are frequently severely limited. Especially
 with .onion nodes. Some non-onion servers can be accessed with
 significant speed though for sustained periods (15-300... maybe
 faster).

That's probably not a Tor-specific problem -- but simply the less
powerful server behind the onioning. I don't think there are any
youtube-sized .onion servers.
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] Freenet speed local threats

2011-12-09 Thread Volodya
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 12/09/2011 02:26 PM, Chris wrote:
 I am looking into setting up a distribution where Tor or freenet is used
 to create a secure and anonymous environment for communicating.
 
 One of the issues with freenet is that it is slow. I haven't used it in
 many years and do understand it has gotten much better. I also am aware
 that after a few days it gets faster as popular data is retained and gets
 'cached' on your node and nearby nodes based on what those around you are
 doing.
 
 What I'm trying to figure out is what happens when your node is not on
 24/7 and you can only connect infrequently for several hours at a time.
 
 Many users have a persistent local threat that they need to be aware of.
 Leaving a server running is not an option as it could be compromised by an
 adversary.
 
 Removable media can reduce that threat. What I'm looking to find out is if
 you run a freenode from a removable media and then run a local server
 running freenode to use as one of your peers (which could be on all the
 time) does this post a threat?
 
 If no local server is run that you peer with how is the speed if you only
 connect every few days? Is running freenet for a few hours to several
 hours going to be sufficient or will it be unbearably slow?
 
 With Tor speeds are frequently severely limited. Especially with .onion
 nodes. Some non-onion servers can be accessed with significant speed
 though for sustained periods (15-300... maybe faster).

The bigger problem with Freenet isn't really speed, it's the latency (i.e. how
long it takes for the data to begin being actually downloaded after request or
be uploaded after the insert starts). That part gets better if you are connected
after some time.

Also you didn't state if you are looking for anonymous publishing or anonymous
downloading. If it's for publishing then Freenet will actually be better than
Tor for you, since after the user goes offline the content doesn't disappear,
and the adversary cannot determine the user simply by looking at patterns in the
accessibility.

However, if you are looking for something which will protect the user, who
cannot run any software for a long period of time and wants to download the
material right after going online, then perhaps something like Tor is better (at
this time).

Of course, what do i know?

  - Volodya




- -- 
http://freedom.libsyn.com/ Echo of Freedom, Radical Podcast

 None of us are free until all of us are free.~ Mihail Bakunin
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJO4h+zAAoJENW9VI+wmYasPPgH/14AOhfo+xW9120RMdxegXYf
81daeoCtFwpYWMKk3flevH9HyjeKdbZymt6sqVq1z90/IPYMz9jXnERKaAGKdegE
cm2Sly0Kg6JkJ+e/sQu3nIKkWcKHv3AsNg9rtp1Kd5Qpe4tpau4V221aZiXLkGtA
RvBL8pKUBNYBq8k5usxVV9m4jArfIYeUN2xcq+BXXwf5Gi/mC4uvov6WAe5VTTOS
Q4bXexqtc1KNnali15uT6EdQqmsac9u/8aVYgeA359etPtHGWvKxyctmpgJuypbS
xE7eoiSstA5gibcd8wIKzIrfOhz92WcC4br2qicwnIy77jq6hPNbqrnFMP8D3Rk=
=T3EK
-END PGP SIGNATURE-
___
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe


Re: [freenet-support] Freenet speed local threats

2011-12-09 Thread Chris
 On Fri, 9 Dec 2011 05:26:19 -0500, Chris wrote:
 I am looking into setting up a distribution where Tor or freenet is
 used to create a secure and anonymous environment for communicating.

 Very cool. I've done that too :-).

 One of the issues with freenet is that it is slow. I haven't used it
 in many years and do understand it has gotten much better. I also am
 aware that after a few days it gets faster as popular data is
 retained and gets 'cached' on your node and nearby nodes based on
 what those around you are doing.

 What I'm trying to figure out is what happens when your node is not on
 24/7 and you can only connect infrequently for several hours at a
 time.

 It runs at esssentially the same speed (minus the benefits of immediate
 local caching, of course) -- which is pretty slow but manageable. It
 may take a few seconds / a minute longer to fetch things, but that's
 still a minute longer than the censored web provides, so either way
 users will have to adjust their expectations. Booting into the network
 will also take an additional minute or so, which always-on nodes don't
 have to worry about.

 Many users have a persistent local threat that they need to be aware
 of. Leaving a server running is not an option as it could be
 compromised by an adversary.

 Removable media can reduce that threat.

 The keyword being *reduce* :p. We all have that concern and fear, of
 unforeseen zero-day linux exploits, etc. (We already know they exist in
 Window$ :). Ideally you would want to make extra sure you have enough
 contingency planning (proper permissioning / stable and patched
 software / firewalls / perhaps caged virtual machines / sentry
 programs / whatever your paranoia desires), so such fears are
 minimized. They will never be eliminated though.


I was not referring to zero day exploits actually. The key word here was
local real-world threats. Such as an adversary gaining physical access to
the server/machine running freenode. Removable media may not eliminate the
threat although there is less opertunity for a more sophisticated targeted
attack. A software keylogger inserted into the MBR or similar would not be
possible if the boot medium is never available to the attacker. On the
other hand a physical keylogger may still be possible and maybe even a
software based keylogger although more difficult to disguise/install
without being noticed. I can think of at least a few different ways of
getting a keylogger onto a system without having access to the boot drive
or having to install a physical device. I would still need physical access
to the computer. At least one method would not even require BIOS
modification and would work on any x86 machine.

 What I'm looking to find out is if you run a freenode from a
 removable media and then run a local server running freenode to use
 as one of your peers (which could be on all the time) does this post
 a threat?

 Besides the obvious risks of either of those machines being compromised
 (by any number of ways: physically, buggy software, leaky software,
 etc), traffic analysis will always be a threat with Tor, and also with
 Freenet if bad guys have somehow managed to occupy all your peer
 connections. But besides these well known threats, I think it's pretty
 safe. But not perfectly safe.

Lets give a scenario:

We have to assume that a persons Internet connection is being monitored.
This might be via a sophisticated non-governmental actor (such as by
breaking WEP/WPA) or by a government act such as monitoring at the telco.
The adversary should also be assumed to be unethical in that there are
no rules and can physically modify or otherwise install a software based
monitoring solution on any boot media they have access to.


The first question is how many peers need to be compromised to identify
the content being transmitted?

If a few of your freenode peers can be compromised and the adversary can
monitor your Internet connection and local area network can they identify
the contents which are being requested/sent by you? This assumes that they
can't bug the physical machine that you are using to run freenode.

If you add a server with freenode (which can be bugged) to your local LAN
that is then added as one of your peers does this compromise the security?
The point of adding a server with freenode to peer with on the local LAN
would be to speed up requests since the machine that is actually used for
browsing freesites (such as a laptop) can't be left on all the time (as
doing so gives an adversary opportunity to bug it). This means it has to
run from a removable boot medium that can be accounted for at all times.


 If no local server is run that you peer with how is the speed if you
 only connect every few days? Is running freenet for a few hours to
 several hours going to be sufficient or will it be unbearably slow?

 It's bearable. (After it takes a few minutes to connect to the
 network.) I suppose it's similar to fetching a freesite you never