> On Sun, 11 Dec 2011 16:36:53 -0500, Chris wrote:
>> How many users actually compile it themselves?
>
> Me, and all other Gentoo users :-).
>
>> How many examine the diffs?
>
> I do, rarely :s.
>
>
>> > [...]
>> > How would you propose to differentiate between a bugged node and a
>> > normal node?
>>
>> This is why you have authentication and checks against any inability
>> to connect to nodes.
>
> There is no such authentication that would help here. And you would be
> able to connect to any node normally -- except the compromised nodes
> would still find a way to become your peers and surround you. (I'm not
> sure exactly what criteria need to be met for your node to accept
> a stranger's offer, but I'm sure a dedicated adversary can easily meet
> them.)

I think you are wrong here. I think authentication could work to a degree
provided certain conditions are true/consistent enough. I am assuming
certain things such as there being enough nodes that come online daily and
stay online permanently. It may not work if the number of nodes which come
online and then go offline is high. I'm no expert here although in theory
you should be able to use authentication to verify that old nodes are
still under the control of the person they were under prior. Chances are
the initial nodes you trust aren't going to be compromised by your
adversary.

The adversary would have to slowly bring on new nodes then and would be
limited to a particular number of nodes per day (however many is typical).
If they try bringing on too many new nodes at once an alert should go up.

For instance say there are 5000 nodes already, and there are never more
than 20 new nodes that come on per day then the adversary would need 8
months to add 5000 nodes. If they brought on 40 nodes a day it would be
apparent that an attack was underway.

The way to do this really is to monitor the data and figure out what the
statistics are or have been over time and then base it off this
information. If there is a change in those statistics it could indicate an
attack.

>
>> You are looking at the issue wrong. It doesn't matter which nodes are
>> bugged. If a user can't connect to higher than normal percentage of
>> nodes it should send up a red flag for one.
>
> They will be able to.

They will be able to what?

>
>> You can keep track of nodes as well and check out which nodes are new
>> and which have been added over time. The number of new nodes coming
>> online shouldn't exceed a certain threshold. If there are 5,000 and
>> on average the number of nodes increase by 2 a week then 100 new
>> nodes coming online should send up a red flag. I don't know what the
>> actual numbers are or the range. Maybe some weeks do see 100 nodes
>> and others only 2. There is probably a number though that could
>> increase the time it takes to pull off such an attack.
>
> There is no such metric -- a slashdot article, for example, could
> easily trigger such a gauge. Moreover, you're not understanding the
> attack enough -- the bad guys don't need to control too many bugged
> nodes -- just a few which they will find a way to peer with you.
>
> By the way, here is one freesite that tries to measure how many nodes
> are on the network:
>   
> USK@85gZTCiQO9IEPDAGvjktO9d-ZMS1lIABR6JB85m4ens,VGDItiCVzCcWAay51faZzcIfAepzeHpzXYvChlueWYE,AQACAAE/stats/1533/
>
>
>> >> and if is not made apparent that is a problem with freenet (or
>> >> whichever project you would be suggesting).
>> >
>> > Yes it is. And that's why it's in the FAQ :p. You should take a bit
>> > more time, and read it more carefully:
>> >
>> > "Combined with harvesting and adaptive search attacks, [the
>> > bootstrapping attack] explains why opennet is regarded by many
>> > core developers as hopelessly insecure. If you want good security
>> > you need to connect only to friends."
>>
>> I don't think you understand how it works that well. I suspect if
>> some of your friends are compromised you won't be.
>
> Did you even read the "Correlation attacks" subsection, from
> http://freenetproject.org/faq.html#attack ?

Yes. I get the jist of it.

>
>
>> I don't doubt that some developers think opennet mode is hopelessly
>> insecure.
>
> It's not that they "think" it's hopelessly insecure. It really is :p. I
> mean, it might still be "good enough" -- but there are actual,
> well-known, unsolvable problems with the opennet idea. Which that FAQ
> should have explained :p.

I'm not arguing it is or isn't. Everything is relative though.

>
>
>> I think the best way to organize a revolt or guerrilla war fare in
>> todays world would probably be to anonymously organize multiple small
>> groups.
>
> I strongly disagree. The battle (no matter which one you pick,
> probably) is ultimately in the minds of the boring violence-phobic
> masses -- the majorities. If you don't have popular support, you're
> doomed no matter what you try to do. The best way to organize a revolt
> is to talk to your friends and family and convince them peacefully and
> rationally. (And freenet is a great tool for this! :D.)

Nobody is saying you don't need public support (at least until you gain
power). If the government is killing off or arresting the organizers then
gaining popular support is difficult or impossible. The problem is that
many people are going to be in great danger as they will be physically
doing things that might get detected. If just one person is detected you
don't want your entire structure to unravel. One person may allow one of
your small groups to be wiped out. You have to assume that once the
adversary has one person in a group they will discover the others in that
group. It should not allow the entire organization to be taken out though.
That is where such a project comes into play.

If users and organizers are using Tor/freenet/whatever it can be difficult
to determine who is organizing, who is actively participating, and who is
just a supporter, or even follower (may be against the revolt). Compared
to if an organizations members know each other and can be forced to talk.
A government in power may not have the resources to arrest all using
Tor/freenet/whatever. That gives the organizers protection (potentially or
hopefully) long enough to let them carry through from the organization to
the actual uprising without it's organizers being killed off. Or give them
opportunity to make mistakes and re-group.










_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to