Dear Freenet Support Team,

I send you this message because I've stumbled upon a "curiosity"  which I'd
like to get explained since I'm not able to find any other documentation
regarding this issue.

I was browsing through my hard drive's Freenet Directory, looking at the
latest logs when I suddenly realized that there were IP adresses written in.

This is an example:

dic 23, 2008 17:06:14:078 (freenet.node.NodeDispatcher, UdpSocketHandler for
port 266XX(2), NORMAL): Rejecting CHK request from 213.238.213.XX:387XX
preemptively because Insufficient output bandwidth

I may not fully understand the protocol Freenet uses for data transmission
but these IP's are uplookable and can represent a problem for anyone who
connects from a country like China.

Also, I wonder if it would be possible to collect valuable information by
gathering the LOGs of many different nodes and following a specific IP's
requests.

Finally I'd like to ask you about this message I found in the logs too:

"Note that this version of Freenet is still a very early alpha, and may well
have numerous bugs and design flaws.
In particular: YOU ARE WIDE OPEN TO YOUR IMMEDIATE PEERS! They can eavesdrop
on your requests with relatively little difficulty at present (correlation
attacks etc)."

I suppose that this must be an old message since the Freenet project is not
in a very early alpha version anymore and I'm using 0.7, the latest.

Thank you very much.

Shiro.

PD. I also wonder where the cached and encrypted files on my HD are
gathering.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/support/attachments/20081223/097a24f0/attachment.html>

Reply via email to