No, I'm not sure exactly what needs to be done.

On Wed, Nov 01, 2006 at 11:26:22PM +0100, bbackde at googlemail.com wrote:
> Not urgent, but nobody told me about this ticket so I assumed from
> toads words that he is not willing to address this issue at all. Sorry
> if I was wrong with that...
> 
> On 11/1/06, Florent Daigni?re (NextGen$) <nextgens at freenetproject.org> 
> wrote:
> >* bbackde at googlemail.com <bbackde at googlemail.com> [2006-11-01 
> >22:41:59]:
> >
> >> This sounds as if you are not willing to implement easy to use and
> >> easy to understand stuff into the node.
> >> You say that the client must handle it, you do not want to do anything 
> >for
> >> it.
> >> What about clients that just do not provide a password prompt? What to
> >> do for the paranoid people? Nothing?
> >>
> >> Please, implement some of this things into the node rather than to
> >> shift all the work to the clients. They could fail, and this would
> >> compromise the anonymity of the (unsuspecting) user. If the node
> >> implements it there much lesser ways for the user to fail.
> >>
> >> And regarding dda: if the user tells the node to not to use dda then
> >> the node should do it. Even if you say it saves so much disk space. If
> >> the user is aware of this disable it.
> >>
> >
> >There are already tickets on mantis for that IIRC ... do it yourself if
> >you think it's urgent ;)
> >
> >> On 11/1/06, toad <toad at amphibian.dyndns.org> wrote:
> >> >On Wed, Nov 01, 2006 at 09:26:03PM +0100, bbackde at googlemail.com wrote:
> >> >> On 11/1/06, toad <toad at amphibian.dyndns.org> wrote:
> >> >> >On Wed, Nov 01, 2006 at 09:04:43PM +0100, bbackde at googlemail.com 
> >wrote:
> >> >> >> A user can run clients in a VM or on another box for exactly this
> >> >> >> reason (some users do this right now). This way bad clients cannot
> >> >> >> read more files than their own, and they cannot read node config
> >> >> >> files. The only way to do bad things is the FCP2 interface. And 
> >their
> >> >> >> must be a way to prevent those kind of dangerous kind of access, at
> >> >> >> least via an option in the node (the most easy way to do it. Only
> >> >> >> requires to ensure an unfaked node).
> >> >> >>
> >> >> >> true?
> >> >> >
> >> >> >Maybe. What would you suggest? The easiest thing is a simple password
> >> >> >necessary for dangerous operations. But then, what operations are
> >> >> >dangerous? Some more than others! Is running unknown clients in a VM
> >> >> >common?
> >> >>
> >> >> Passwords are useless if a client is corrupted. If a client stores the
> >> >> password the corrupted client can use it. If a client asks for
> >> >> permission it would be ok, but annoys the user.
> >> >>
> >> >Untrusted clients wouldn't be given the password. What's the problem?
> >> >
> >> >> I would suggest to add a node parameter "paranoiaMode=true" that
> >> >disables:
> >> >> - direct disk access (only socket connections allowed)
> >> >> - the send of any worthful NodeInfo stuff like keys
> >> >> - and probably more
> >> >
> >> >What if you are e.g. running Fproxy over FCP? It seems to me that it
> >> >would be useful to be able to have some clients trusted and others not.
> >> >And I don't want yet another reason not to use direct disk access;
> >> >direct disk access saves _a lot_ of disk space.
> >> >
> >> >One interesting possibility would be to disallow dangerous operations on
> >> >non-localhost connections, but even then you have to worry about ssh
> >> >forwarding.
> >> >>
> >> >> Disallow anything that could access the box where the node runs. Only
> >> >> pure FCP2 is allowed.
> >> >>
> >> >> >>
> >> >> >> On 11/1/06, toad <toad at amphibian.dyndns.org> wrote:
> >> >> >> >Bad clients can read (and write!) all your files anyway. Secure
> >> >plugins
> >> >> >> >have been proposed but will be significant work.
> >> >> >> >
> >> >> >> >On Wed, Nov 01, 2006 at 08:32:36PM +0100, bbackde at googlemail.com
> >> >wrote:
> >> >> >> >> Ok I understand. But its not easy for users to separate good 
> >from
> >> >> >> >> faked freenet clients.
> >> >> >> >>
> >> >> >> >> Maybe all clients should sign their binary code in the jar file 
> >to
> >> >> >> >> enure its unchanged. And maybe there is some way to provide a
> >> >> >> >> certificate to the node. Then the freenetproject people could 
> >check
> >> >> >> >> the code of clients apps and give them a certificate that is
> >> >hardcoded
> >> >> >> >> in the freenet node. Only apps that have this certificate are
> >> >allowed
> >> >> >> >> to connect to the node if the user configured the "high security
> >> >> >> >> mode".
> >> >> >> >> Updating the node together with new clients is not too much work
> >> >and
> >> >> >> >> is acceptable for users.
> >> >> >> >>
> >> >> >> >> I don't know about the details of signed java code,...
> >> >> >> >>
> >> >> >> >> Maybe this would be a good item for the todo list (on
> >> >> >> >> bugs.freenetproject.org)?
> >> >> >> >>
> >> >> >> >> On 11/1/06, toad <toad at amphibian.dyndns.org> wrote:
> >> >> >> >> >You are wrong. Anyone with access to FCP can already:
> >> >> >> >> >- Upload arbitrary files which the node can access.
> >> >> >> >> >- Read your node reference, your peers and your config
> >> >> >> >> >- Add or remove peers
> >> >> >> >> >- Change config options
> >> >> >> >> >- Write to arbitrary non-existent files which the node can 
> >access
> >> >> >> >> >
> >> >> >> >> >It has been suggested that a simple password or a full
> >> >> >> >> >username/password login might be useful. Nothing was ever 
> >really
> >> >> >agreed
> >> >> >> >> >or implemented.
> >> >> >> >> >
> >> >> >> >> >So be careful who you let have FCP access!
> >> >> >> >> >
> >> >> >> >> >On Wed, Nov 01, 2006 at 07:36:48PM +0100, 
> >bbackde at googlemail.com
> >> >> >wrote:
> >> >> >> >> >> Is it true what I see, is each FCP2 client now able to 
> >retrieve
> >> >the
> >> >> >> >> >> private DSA key from the node, the key that uniquely 
> >identifies
> >> >> >your
> >> >> >> >> >> node???
> >> >> >> >> >>
> >> >> >> >> >> Do you think this is a nice feature? Someone could hack some
> >> >> >existing
> >> >> >> >> >> open source application, provide them to some incautious 
> >users
> >> >and
> >> >> >> >> >> send their private DSA key to some big brother for 
> >analysis???
> >> >> >> >> >>
> >> >> >> >> >> I don't want to accept this without an important reason. I 
> >have
> >> >no
> >> >> >> >> >> idea what a client could do with this private key, except to
> >> >send
> >> >> >it
> >> >> >> >> >> to some big brother.
> >> >> >> >> >>
> >> >> >> >> >> Or am I wrong?
> >> >> >> >> >
> >> >> >> >> >
> >> >> >> >> >-----BEGIN PGP SIGNATURE-----
> >> >> >> >> >Version: GnuPG v1.4.5 (GNU/Linux)
> >> >> >> >> >
> >> >> >> >> 
> >>iD8DBQFFSPACA9rUluQ9pFARAn/OAJ4uWpvQzVJ+AZY3dIANIkcAeHRsCgCfUiEP
> >> >> >> >> >TiZxr4+gbS4u+0iU7tM6JdM=
> >> >> >> >> >=ao4L
> >> >> >> >> >-----END PGP SIGNATURE-----
> >> >> >> >> >
> >> >> >> >> >
> >> >> >> >> >_______________________________________________
> >> >> >> >> >Tech mailing list
> >> >> >> >> >Tech at freenetproject.org
> >> >> >> >> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >> >> >> >
> >> >> >> >> >
> >> >> >> >> _______________________________________________
> >> >> >> >> Tech mailing list
> >> >> >> >> Tech at freenetproject.org
> >> >> >> >> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >> >> >>
> >> >> >> >
> >> >> >> >
> >> >> >> >-----BEGIN PGP SIGNATURE-----
> >> >> >> >Version: GnuPG v1.4.5 (GNU/Linux)
> >> >> >> >
> >> >> >> >iD8DBQFFSPpMA9rUluQ9pFARAttWAJ96NdhGKQgkMuZRcMsLU26W3vuaMwCfcjvT
> >> >> >> >vBdp6Ce0esREBFPdt5kKAWo=
> >> >> >> >=gIIZ
> >> >> >> >-----END PGP SIGNATURE-----
> >> >> >> >
> >> >> >> >
> >> >> >> >_______________________________________________
> >> >> >> >Tech mailing list
> >> >> >> >Tech at freenetproject.org
> >> >> >> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >> >> >
> >> >> >> >
> >> >> >> _______________________________________________
> >> >> >> Tech mailing list
> >> >> >> Tech at freenetproject.org
> >> >> >> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >> >>
> >> >> >
> >> >> >
> >> >> >-----BEGIN PGP SIGNATURE-----
> >> >> >Version: GnuPG v1.4.5 (GNU/Linux)
> >> >> >
> >> >> >iD8DBQFFSP6EA9rUluQ9pFARAuKtAKCPUt/lvoXA5y/SSfWk3lJLYsA49QCdG7yK
> >> >> >yz+w9o6BOLfn/Em57p82VBc=
> >> >> >=MmKB
> >> >> >-----END PGP SIGNATURE-----
> >> >> >
> >> >> >
> >> >> >_______________________________________________
> >> >> >Tech mailing list
> >> >> >Tech at freenetproject.org
> >> >> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >> >
> >> >> >
> >> >> _______________________________________________
> >> >> Tech mailing list
> >> >> Tech at freenetproject.org
> >> >> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >>
> >> >
> >> >
> >> >-----BEGIN PGP SIGNATURE-----
> >> >Version: GnuPG v1.4.5 (GNU/Linux)
> >> >
> >> >iD8DBQFFSQsPA9rUluQ9pFARAp8yAJ43NIBj6VTS/q3GjPZcNMGAVJpERwCfdbSR
> >> >98BkPd1ubdg9xH56d1BhD10=
> >> >=Q46z
> >> >-----END PGP SIGNATURE-----
> >> >
> >> >
> >> >_______________________________________________
> >> >Tech mailing list
> >> >Tech at freenetproject.org
> >> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >> >
> >> >
> >> _______________________________________________
> >> Tech mailing list
> >> Tech at freenetproject.org
> >> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >
> >
> >-----BEGIN PGP SIGNATURE-----
> >Version: GnuPG v1.4.5 (GNU/Linux)
> >
> >iD8DBQFFSRlMU/Z/dHFfxtcRArNeAKCEn8Huf/emEHuRnadzW2RpbUSqFQCdGZ9N
> >/0x3cB+DPP4luzR9n7+b+oQ=
> >=cp9v
> >-----END PGP SIGNATURE-----
> >
> >
> >_______________________________________________
> >Tech mailing list
> >Tech at freenetproject.org
> >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> >
> >
> _______________________________________________
> Tech mailing list
> Tech at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech
> 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20061102/1e161a41/attachment.pgp>

Reply via email to