On 07-Jun-16 3:54 PM, Matthew Toseland wrote:
> Freenet build 1474 has been partially released. It includes a critical bugfix
> for the "Frostbite" bug: if you visit a malicious key, downloads can stop
> working. This is being actively exploited on Frost and Sone/WoT. Unloading
> WoT / turning off Frost and restarting the node should make it work again.

This crack was an exploit of Freenet. Not of Frost.
It affected both users of WoT and users of Frost.

It should for that reason not be called 'Frostbite' but 
'Freenetbite'.


All users of both programs during the attack must upgrade to the 
repaired version
of Freenet, build 1474 because their node is corrupted and can not 
be repaired.
Users whose node is corrupted can not upgrade over Freenet, they 
must use the
clearweb upgrading method.

Shut down Freenet.
Windows users must use the DOS command line, navigate to the 
Freenet folder:
update.cmd
Linux users need this command: "./update.sh"


This was not just some bug in Freenet, this attack was the most 
severe attack on
Freenet I have seen in over 10 years of using Freenet.
This crack was damaging all nodes of everybody who used either the 
Web of Trust
plugin, or Frost.

I think the importance of this crack should be taken seriously.

This time the anonymity of Freenet users has not been endangered,
but an attack this effective may well expose all damaged nodes.

Since downloading a malicious key was enough, this crack could have 
been applied
to the key of a freesite or even to the key to download a 
particular file.

I know this is no good advertizing of Freenet but this has happened.
Please allow this anonymous message on the support list.
_______________________________________________
Support mailing list
Support@freenetproject.org
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:support-requ...@freenetproject.org?subject=unsubscribe

Reply via email to