Another problem I see is: if you are using K as a seed to generate a
consistent set A, it could be possible to just collect a large set of
HELLOs "B" and see if any Ki in B generates a large subset of B. Then the
Ki must be real and all the generated HELLOs, fake, and you are busted.

Bart Polot


On 29 November 2012 19:53, Christian Grothoff <groth...@in.tum.de> wrote:

> On 24 November 2012 13:56, LRN <lrn1...@gmail.com
>
>> <mailto:lrn1...@gmail.com>> wrote:
>>
>>     -----BEGIN PGP SIGNED MESSAGE-----
>>     Hash: SHA1
>>
>>     This is the idea that i've been thinking on.
>>     It should be possible for GNUnet node operator to hide the fact that
>>     his machine runs a GNUnet node.
>>
>>     Ways to achieve this:
>>
>>     1) Fake HELLO messages.
>>     AFAIU, right now anyone can collect HELLO messages (by running a node,
>>     or by querying a hostlist server), and then claim (with certain degree
>>     of sureness) that GNUnet nodes run on all addresses listed in these
>>     messages. Companies that track torrent users do this for BitTorrent.
>>     They may then proceed to actually connect to listed addresses to
>>     verify them, but that is quite another story.
>>     The solution is to spread fake HELLOs with fake public keys and fake
>>     addresses.
>>     A node should use its private key (key K) as a seed to generate a set
>>     fake of addresses (set A). Then use K and A themselves to generate
>>     fake public key (key F) for each A, thus getting a complete HELLO
>>     message. The use of K as a seed ensures that the node will keep lying
>>     about the same set of addresses (how large that set should be is an
>>     open question) with the same keys, making the fakes more believable
>>     (observer might think that these are real nodes, maintaining their
>>     real HELLOs over time; failure to validate any of them might be blamed
>>     on firewalls, etc).
>>     Address sets will intersect (A1 and A2 generated from K1 and K2 may
>>     share some elements), obviously, although that might not be true for
>>     IPv6 addresses...
>>     I expect that address generator will apply some rules to generate
>>     believable addresses (i.e. don't generate invalid IP addresses, like
>>     10.1.0.255).
>>     As an extra, a node could validate generated addresses and do
>>     non-agressive portscanning (or something similar - we're not speaking
>>     only of tcp) on them, to be able to add ports (or other parts of the
>>     address) that look believable to observers.
>>
>>     AFAIU, right now nodes won't gossip about fake HELLOs (i.e. a node
>>     will never tell another node about a HELLO it got, unless it validated
>>     that HELLO). That might need to be changed to allow nodes to choose a
>>     random subset of invalid HELLOs and gossip about them as well.
>>     Otherwise only the node that generated them will be able to spread
>> them.
>>     Not sure about hostlists.
>>
>>     Extra yummy feature - add user-configurable fake templates, which
>>     could have addresses only, or addresses and private keys. GNUnet node
>>     will use templates from time to time (configurable) instead of
>>     generated addresses, and will generate missing template elements.
>>     It would be neat to be able to tell the world that 65.55.58.201 [1]
>>     runs a GNUnet http_server transport on port 80...
>>
>
> This is also too complex
>
>>
>>
> ______________________________**_________________
> GNUnet-developers mailing list
> GNUnet-developers@gnu.org
> https://lists.gnu.org/mailman/**listinfo/gnunet-developers<https://lists.gnu.org/mailman/listinfo/gnunet-developers>
>
_______________________________________________
GNUnet-developers mailing list
GNUnet-developers@gnu.org
https://lists.gnu.org/mailman/listinfo/gnunet-developers

Reply via email to