On Thu, Nov 02, 2006 at 10:26:38PM +0100, bbackde at googlemail.com wrote: > I think there are technical problems with this solution. 'client gets > some unique identifier'. If some other client takes over the trusted > client and reads the password from a config file it could authorize to > the node as the trusted client. Unique identification could only be > implemented if you use signed classes and certificates that are > hardcoded into the node for each client (and per client version). Alot > of work and complexity, but true this would be needed to be 100% sure > that you can trust a client. But then the issuer of the certificate > (some trusted instance) would have to carefully check the source code > of the client for malicious code parts before they give the client a > certificate... who does and pays this ?
Not possible; requires TPM. What you could do is have the client generate a certificate on first use. > > On 11/2/06, Phillip Hutchings <sitharus at sitharus.com> wrote: > >On 11/3/06, toad <toad at amphibian.dyndns.org> wrote: > >> How about the following?: > >> > >> 1. Any FCP connection not from localhost is automatically set to > >> untrusted mode. > >> 2. The user may set a flag indicating that all connections are > >> untrusted. > >> 3. The user may create one or more username/password pairs for > >> authorized access. These are kept in a file readable only by the user > >> running the node: > >> username:password:keywords > >> > >> "keywords" contains a list of keywords (config, read-disk, write-disk, > >> etc). > >> > >> I have considered specific limitations on where in the local filesystem > >> files can be downloaded to / uploaded from. I'm not convinced that this > >> is Freenet's job; if you have untrusted local users (and maybe even if > >> you don't), you should run Freenet in a chroot. And if the attacker has > >> filesystem access, he can create symlinks etc (which java cannot deal > >> with). It is impossible for us to for example fork a subprocess which > >> then setuid's to the user in question. So I say we shouldn't get into > >> that, since we can't do it well. > > > >I was thinking something like this: > > - When an FCP client connects it gets a unique identifier of some sort > > - By default FCP clients have no rights for 'dangerous' operations, > >except fproxy. The node could generate a key for fproxy and store it > >somewhere with no world/group permissions > > - If you want to upgrade an app to have those permissions you have to > >go to fproxy (or another authorised app) and add the permissions, > >kinda like how flickr does it > > > >Downsides: > > - All clients need to be aware of it, FCP will have to change > > - Still doesn't protect against local attacks, but will protect from > >forwarding attacks > > - Harder to implement > > > >Upsides: > > - Users don't need to worry about passwords... > > > >-- > >Phillip Hutchings > >http://www.sitharus.com/ > >_______________________________________________ > >Tech mailing list > >Tech at freenetproject.org > >http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > > > _______________________________________________ > Tech mailing list > Tech at freenetproject.org > http://emu.freenetproject.org/cgi-bin/mailman/listinfo/tech > -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <https://emu.freenetproject.org/pipermail/tech/attachments/20061102/a279386e/attachment.pgp>