On Friday 05 June 2009 17:53:28 Juiceman wrote:
> On Fri, Jun 5, 2009 at 10:20 AM, Matthew
> Toseland<toad at amphibian.dyndns.org> wrote:
> > 9. Inserts of data which is not predictable by an attacker should be 
> > encouraged, where this is reasonably possible. There are strong arguments 
> > that the need to heal splitfiles is critical to good performance. Hopefully 
> > this will be reduced when we have Bloom filter sharing. If an insert is 
> > indistinguishable, there is a good chance of its remaining reasonably 
> > anonymous, even on opennet; bursts are a threat, and can perhaps be covered 
> > relatively easily. In traffic terms, an insert is similar to an answered 
> > request, unless you can trace it across the network and show that it is 
> > longer than a request. So at normal or higher, unless the user overrides a 
> > specific setting, we should seriously consider severely limiting the 
> > bandwidth usage of inserts. In practice, we already do this, by treating 
> > our inserts just like any other requests from any other peer.
> 
> I think MHK's will greatly improve splitfile reliability.  Any chance
> this can make it into 0.7.5?

No.
> 
> >
> > 10. Favouritism: How much can we prefer our own requests to others, in 
> > terms of what is feasible for the network as a whole, and in terms of what 
> > is safe? At the moment, we don't favour our requests at all, except that we 
> > generally take into account the fact that they won't generate any output 
> > usage (which can be a big factor, since usually input bandwidth is way less 
> > than output bandwidth). IMHO this is an open question. If we favour our own 
> > requests too much, opennet peers will drop us, darknet peers will refuse to 
> > answer our requests by reciprocity for us not answering theirs (assuming we 
> > implement this, which imho is a good idea eventually), and peers we do have 
> > will know our requests are local. IMHO the above reasoning does allow for 
> > us to use excess capacity for our own requests, this is bursting; in other 
> > words, as a starting point, if there are requests to send from other peers 
> > and local requests to send we treat them equally (implying for example that 
> > we don't consider far more of our queued requests than theirs), but if 
> > there are no requests to send and there is the capacity to send some more, 
> > we can send our local requests, unless we are on darknet, doing a 
> > non-identifiable insert, and are very worried about our security.
> >
> > DOCUMENTATION/ATTITUDE/GOALS CHANGES:
> >
> > 1. Opennet security sucks. Really, it does. It may be better than some of 
> > the alternatives, but it isn't vastly better. But IMHO we have the 
> > potential to achieve fairly interesting performance on opennet - not 
> > instant results, but fairly good throughput and reachability for rarer 
> > content.
> > 2. Unpredictable inserts can be reasonably secure even on opennet, provided 
> > precautions are taken and the attacker isn't too powerful.
> > 3. It is a good idea to have stuff downloading constantly, although 
> > downloading stuff you don't need will slow down the network at large.
> 
> Would a list of keys we've transferred (either requested or forwarded
> for a peer) in the past "x" hours and randomly re-requesting some
> during periods of low downloads help to disguise traffic?

Perhaps, but at a performance cost, especially given the below.
> 
> For that matter, perhaps a queue for splitfile healing that inserts
> random healing CHKs, or do we already do this?

We do insert a lot of healed CHKs.
> 
> > Bloom filter changes mean it won't be cached on your node, but it
> will be cached by reasonably nearby nodes.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 835 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20090605/440e36dc/attachment.pgp>

Reply via email to