On Tuesday 06 January 2009 16:51, 3BUIb3S50i 3BUIb3S50i wrote:
> So, Freemulet or Frost "automatic insertion" are dangerous? We know the key
> before the upload of the file.

Yes IMHO.
> 
> 
> On Mon, Jan 5, 2009 at 5:29 PM, Matthew Toseland
> <toad at amphibian.dyndns.org>wrote:
> 
> > On Tuesday 23 December 2008 18:14, Shironeko wrote:
> > > Dear Freenet Support Team,
> > >
> > > I send you this message because I've stumbled upon a "curiosity"  which
> > I'd
> > > like to get explained since I'm not able to find any other documentation
> > > regarding this issue.
> > >
> > > I was browsing through my hard drive's Freenet Directory, looking at the
> > > latest logs when I suddenly realized that there were IP adresses written
> > in.
> > >
> > > This is an example:
> > >
> > > dic 23, 2008 17:06:14:078 (freenet.node.NodeDispatcher, UdpSocketHandler
> > for
> > > port 266XX(2), NORMAL): Rejecting CHK request from 213.238.213.XX:387XX
> > > preemptively because Insufficient output bandwidth
> > >
> > > I may not fully understand the protocol Freenet uses for data
> > transmission
> > > but these IP's are uplookable and can represent a problem for anyone who
> > > connects from a country like China.
> >
> > I don't see why. For it to be a problem the bad guys would have to already
> > have seized (or electronically compromised) your node, in which case they
> > probably have your browser history, your datastore, your Friends list ...
> > >
> > > Also, I wonder if it would be possible to collect valuable information 
by
> > > gathering the LOGs of many different nodes and following a specific IP's
> > > requests.
> >
> > Yes, but you'd need to compromise all the nodes on the path of that
> > request.
> > >
> > > Finally I'd like to ask you about this message I found in the logs too:
> > >
> > > "Note that this version of Freenet is still a very early alpha, and may
> > well
> > > have numerous bugs and design flaws.
> > > In particular: YOU ARE WIDE OPEN TO YOUR IMMEDIATE PEERS! They can
> > eavesdrop
> > > on your requests with relatively little difficulty at present
> > (correlation
> > > attacks etc)."
> > >
> > > I suppose that this must be an old message since the Freenet project is
> > not
> > > in a very early alpha version anymore and I'm using 0.7, the latest.
> >
> > This is partly true. There are a number of known attacks on Freenet, which
> > cannot be completely eliminated short of new features which we have not 
yet
> > implemented. On the other hand, for some situations, Freenet may be the
> > best
> > currently available. For example, Freenet's scalable darknet functionality
> > is
> > fairly unusual, allowing you to only connect to people you trust, and also
> > it
> > is easier to safely publish a website on Freenet than on a Tor hidden
> > service
> > afaik (due to e.g. issues with configuring apache to not give away
> > incriminating details, and much harder intersection attacks). The bottom
> > line
> > is if you are going to stake your freedom and/or life on the security of 
an
> > anonymous network, you need to seriously consider the pro's and con's of
> > each
> > possible option, including doing nothing; Freenet has had severe bugs in
> > the
> > past, and is pre-1.0, but apart from that, we have fairly serious known
> > attacks...
> >
> > There are 4 basic powerful attacks on Freenet that we are concerned about:
> > 1. Harvesting. Finding lots of Freenet nodes quickly, in order to e.g.
> > block
> > them on a national firewall. Most anonymous networks do not address this
> > problem at all. On opennet, harvesting is relatively easy (slightly harder
> > than on Tor or I2P); on darknet, harvesting should be fairly hard.
> > 2. Datastore seizure. What happens when/if the bad guys either
> > electronically
> > compromise or physically seize your computer? At the moment everything you
> > download through Freenet is cached in your datastore. Temporary files are
> > encrypted with ephemeral keys, but for long-term downloads we have to 
store
> > the keys to disk.
> > 3. Snooping on your peers. It is probably possible, under some assumptions
> > (e.g. being able to identify the content, it being sufficiently large), to
> > do
> > statistical attacks to figure out what those nodes you are connected to 
are
> > downloading/uploading. This is yet another reason to use darknet.
> > 4. Mobile attacker tracing the source of a stream of content. If an
> > anonymous
> > identity publishes data that can be identified (e.g. reinserting known
> > content, posting to FMS boards, posting to a known freesite), it may be
> > possible to gradually approach his location. Reinsertion of known content
> > makes this much easier, because of CHKs; because we always insert the top
> > block (the freesite USK e.g.) last, if the content isn't guessable in
> > advance
> > it is very difficult to pull this off against large inserts, because the
> > attacker can only identify the stream after the top block (or the FMS post
> > referring to the new file) was inserted; if the content *is* guessable, 
the
> > attacker can move towards the target continually over the course of the
> > insert.
> >
> > All of these attacks we have some mitigation against, but all of them are
> > feasible to some extent under some mostly-reasonable assumptions. Later
> > versions of Freenet will make them much harder with new features e.g.
> > rendezvous tunnels.
> > >
> > > Thank you very much.
> > >
> > > Shiro.
> > >
> > > PD. I also wonder where the cached and encrypted files on my HD are
> > > gathering.
> >
> > In the freenet directory, generally speaking.
> >
> > _______________________________________________
> > Support mailing list
> > Support at freenetproject.org
> > http://news.gmane.org/gmane.network.freenet.support
> > Unsubscribe at
> > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/support
> > Or mailto:support-request at freenetproject.org?subject=unsubscribe
> >
> 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 827 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/support/attachments/20090106/2bbf1af1/attachment.pgp>

Reply via email to