> On Fri, 9 Dec 2011 05:26:19 -0500, Chris wrote: >> I am looking into setting up a distribution where Tor or freenet is >> used to create a secure and anonymous environment for communicating. > > Very cool. I've done that too :-). > >> One of the issues with freenet is that it is slow. I haven't used it >> in many years and do understand it has gotten much better. I also am >> aware that after a few days it gets faster as popular data is >> retained and gets 'cached' on your node and nearby nodes based on >> what those around you are doing. >> >> What I'm trying to figure out is what happens when your node is not on >> 24/7 and you can only connect infrequently for several hours at a >> time. > > It runs at esssentially the same speed (minus the benefits of immediate > local caching, of course) -- which is pretty slow but manageable. It > may take a few seconds / a minute longer to fetch things, but that's > still a minute longer than the censored web provides, so either way > users will have to adjust their expectations. Booting into the network > will also take an additional minute or so, which always-on nodes don't > have to worry about. > >> Many users have a persistent local threat that they need to be aware >> of. Leaving a server running is not an option as it could be >> compromised by an adversary. >> >> Removable media can reduce that threat. > > The keyword being *reduce* :p. We all have that concern and fear, of > unforeseen zero-day linux exploits, etc. (We already know they exist in > Window$ :). Ideally you would want to make extra sure you have "enough" > contingency planning (proper permissioning / stable and patched > software / firewalls / perhaps "caged" virtual machines / "sentry" > programs / whatever your paranoia desires), so such fears are > minimized. They will never be eliminated though. >
I was not referring to zero day exploits actually. The key word here was local real-world threats. Such as an adversary gaining physical access to the server/machine running freenode. Removable media may not eliminate the threat although there is less opertunity for a more sophisticated targeted attack. A software keylogger inserted into the MBR or similar would not be possible if the boot medium is never available to the attacker. On the other hand a physical keylogger may still be possible and maybe even a software based keylogger although more difficult to disguise/install without being noticed. I can think of at least a few different ways of getting a keylogger onto a system without having access to the boot drive or having to install a physical device. I would still need physical access to the computer. At least one method would not even require BIOS modification and would work on any x86 machine. >> What I'm looking to find out is if you run a freenode from a >> removable media and then run a local server running freenode to use >> as one of your peers (which could be on all the time) does this post >> a threat? > > Besides the obvious risks of either of those machines being compromised > (by any number of ways: physically, buggy software, leaky software, > etc), traffic analysis will always be a threat with Tor, and also with > Freenet if bad guys have somehow managed to occupy all your peer > connections. But besides these well known threats, I think it's pretty > safe. But not perfectly safe. Lets give a scenario: We have to assume that a persons Internet connection is being monitored. This might be via a sophisticated non-governmental actor (such as by breaking WEP/WPA) or by a government act such as monitoring at the telco. The adversary should also be assumed to be "unethical" in that there are no rules and can physically modify or otherwise install a software based monitoring solution on any boot media they have access to. The first question is how many peers need to be compromised to identify the content being transmitted? If a few of your freenode peers can be compromised and the adversary can monitor your Internet connection and local area network can they identify the contents which are being requested/sent by you? This assumes that they can't bug the physical machine that you are using to run freenode. If you add a server with freenode (which can be bugged) to your local LAN that is then added as one of your peers does this compromise the security? The point of adding a server with freenode to peer with on the local LAN would be to speed up requests since the machine that is actually used for browsing freesites (such as a laptop) can't be left on all the time (as doing so gives an adversary opportunity to bug it). This means it has to run from a removable boot medium that can be accounted for at all times. > >> If no local server is run that you peer with how is the speed if you >> only connect every few days? Is running freenet for a few hours to >> several hours going to be sufficient or will it be unbearably slow? > > It's bearable. (After it takes a few minutes to connect to the > network.) I suppose it's similar to fetching a freesite you never > fetched before -- perhaps a bit faster. > >> With Tor speeds are frequently severely limited. Especially >> with .onion nodes. Some non-onion servers can be accessed with >> significant speed though for sustained periods (15-300... maybe >> faster). > > That's probably not a Tor-specific problem -- but simply the less > powerful server behind the onioning. I don't think there are any > youtube-sized .onion servers. I'm petty sure this is the result of going through 6 nodes. The chance of getting a fast connection through 6 nodes seems highly unlikely. With three nodes you might get 30-300 when connecting to a non-onion web site. Frequently 60-120 and sometimes 300. With onion sites though you connect through three nodes plus the server connects through three nodes. That is 6 nodes you have to go through to get content. You can only forcefully change your three nodes. On average you are looking at 5-10 (frequently up to maybe 30) although probably maxing out at 100. > _______________________________________________ > Support mailing list > Support@freenetproject.org > http://news.gmane.org/gmane.network.freenet.support > Unsubscribe at > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support > Or mailto:support-requ...@freenetproject.org?subject=unsubscribe > _______________________________________________ Support mailing list Support@freenetproject.org http://news.gmane.org/gmane.network.freenet.support Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support Or mailto:support-requ...@freenetproject.org?subject=unsubscribe