On 11/1/06, toad <toad at amphibian.dyndns.org> wrote: > On Wed, Nov 01, 2006 at 09:04:43PM +0100, bbackde at googlemail.com wrote: > > A user can run clients in a VM or on another box for exactly this > > reason (some users do this right now). This way bad clients cannot > > read more files than their own, and they cannot read node config > > files. The only way to do bad things is the FCP2 interface. And their > > must be a way to prevent those kind of dangerous kind of access, at > > least via an option in the node (the most easy way to do it. Only > > requires to ensure an unfaked node). > > > > true? > > Maybe. What would you suggest? The easiest thing is a simple password > necessary for dangerous operations. But then, what operations are > dangerous? Some more than others! Is running unknown clients in a VM > common?
Passwords are useless if a client is corrupted. If a client stores the password the corrupted client can use it. If a client asks for permission it would be ok, but annoys the user. I would suggest to add a node parameter "paranoiaMode=true" that disables: - direct disk access (only socket connections allowed) - the send of any worthful NodeInfo stuff like keys - and probably more Disallow anything that could access the box where the node runs. Only pure FCP2 is allowed. > > > > On 11/1/06, toad <toad at amphibian.dyndns.org> wrote: > > >Bad clients can read (and write!) all your files anyway. Secure plugins > > >have been proposed but will be significant work. > > > > > >On Wed, Nov 01, 2006 at 08:32:36PM +0100, bbackde at googlemail.com wrote: > > >> Ok I understand. But its not easy for users to separate good from > > >> faked freenet clients. > > >> > > >> Maybe all clients should sign their binary code in the jar file to > > >> enure its unchanged. And maybe there is some way to provide a > > >> certificate to the node. Then the freenetproject people could check > > >> the code of clients apps and give them a certificate that is hardcoded > > >> in the freenet node. Only apps that have this certificate are allowed > > >> to connect to the node if the user configured the "high security > > >> mode". > > >> Updating the node together with new clients is not too much work and > > >> is acceptable for users. > > >> > > >> I don't know about the details of signed java code,... > > >> > > >> Maybe this would be a good item for the todo list (on > > >> bugs.freenetproject.org)? > > >> > > >> On 11/1/06, toad <toad at amphibian.dyndns.org> wrote: > > >> >You are wrong. Anyone with access to FCP can already: > > >> >- Upload arbitrary files which the node can access. > > >> >- Read your node reference, your peers and your config > > >> >- Add or remove peers > > >> >- Change config options > > >> >- Write to arbitrary non-existent files which the node can access > > >> > > > >> >It has been suggested that a simple password or a full > > >> >username/password login might be useful. Nothing was ever really agreed > > >> >or implemented. > > >> > > > >> >So be careful who you let have FCP access! > > >> > > > >> >On Wed, Nov 01, 2006 at 07:36:48PM +0100, bbackde at googlemail.com > > >> >wrote: > > >> >> Is it true what I see, is each FCP2 client now able to retrieve the > > >> >> private DSA key from the node, the key that uniquely identifies your > > >> >> node??? > > >> >> > > >> >> Do you think this is a nice feature? Someone could hack some existing > > >> >> open source application, provide them to some incautious users and > > >> >> send their private DSA key to some big brother for analysis??? > > >> >> > > >> >> I don't want to accept this without an important reason. I have no > > >> >> idea what a client could do with this private key, except to send it > > >> >> to some big brother. > > >> >> > > >> >> Or am I wrong? > > >> > > > >> > > > >> >-----BEGIN PGP SIGNATURE----- > > >> >Version: GnuPG v1.4.5 (GNU/Linux) > > >> > > > >> >iD8DBQFFSPACA9rUluQ9pFARAn/OAJ4uWpvQzVJ+AZY3dIANIkcAeHRsCgCfUiEP > > >> >TiZxr4+gbS4u+0iU7tM6JdM= > > >> >=ao4L > > >> >-----END PGP SIGNATURE----- > > >> > > > >> > > > >> >_______________________________________________ > > >> >Tech mailing list > > >> >Tech at freenetproject.org > > >> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > > >> > > > >> > > > >> _______________________________________________ > > >> Tech mailing list > > >> Tech at freenetproject.org > > >> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > > >> > > > > > > > > >-----BEGIN PGP SIGNATURE----- > > >Version: GnuPG v1.4.5 (GNU/Linux) > > > > > >iD8DBQFFSPpMA9rUluQ9pFARAttWAJ96NdhGKQgkMuZRcMsLU26W3vuaMwCfcjvT > > >vBdp6Ce0esREBFPdt5kKAWo= > > >=gIIZ > > >-----END PGP SIGNATURE----- > > > > > > > > >_______________________________________________ > > >Tech mailing list > > >Tech at freenetproject.org > > >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > > > > > > > > _______________________________________________ > > Tech mailing list > > Tech at freenetproject.org > > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > > > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.5 (GNU/Linux) > > iD8DBQFFSP6EA9rUluQ9pFARAuKtAKCPUt/lvoXA5y/SSfWk3lJLYsA49QCdG7yK > yz+w9o6BOLfn/Em57p82VBc= > =MmKB > -----END PGP SIGNATURE----- > > > _______________________________________________ > Tech mailing list > Tech at freenetproject.org > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > >