Sorry, on re-read I noticed you want to use the *private* key to generate
A. Forgeddaboutit.

This just raises another risk: you're making public extra info related
somehow to your private key, which if you're not extra careful can be a big
fail.

Bart Polot


On 29 November 2012 20:14, Bart Polot <bart.po...@gmail.com> wrote:

> Another problem I see is: if you are using K as a seed to generate a
> consistent set A, it could be possible to just collect a large set of
> HELLOs "B" and see if any Ki in B generates a large subset of B. Then the
> Ki must be real and all the generated HELLOs, fake, and you are busted.
>
> Bart Polot
>
>
> On 29 November 2012 19:53, Christian Grothoff <groth...@in.tum.de> wrote:
>
>> On 24 November 2012 13:56, LRN <lrn1...@gmail.com
>>
>>> <mailto:lrn1...@gmail.com>> wrote:
>>>
>>>     -----BEGIN PGP SIGNED MESSAGE-----
>>>     Hash: SHA1
>>>
>>>     This is the idea that i've been thinking on.
>>>     It should be possible for GNUnet node operator to hide the fact that
>>>     his machine runs a GNUnet node.
>>>
>>>     Ways to achieve this:
>>>
>>>     1) Fake HELLO messages.
>>>     AFAIU, right now anyone can collect HELLO messages (by running a
>>> node,
>>>     or by querying a hostlist server), and then claim (with certain
>>> degree
>>>     of sureness) that GNUnet nodes run on all addresses listed in these
>>>     messages. Companies that track torrent users do this for BitTorrent.
>>>     They may then proceed to actually connect to listed addresses to
>>>     verify them, but that is quite another story.
>>>     The solution is to spread fake HELLOs with fake public keys and fake
>>>     addresses.
>>>     A node should use its private key (key K) as a seed to generate a set
>>>     fake of addresses (set A). Then use K and A themselves to generate
>>>     fake public key (key F) for each A, thus getting a complete HELLO
>>>     message. The use of K as a seed ensures that the node will keep lying
>>>     about the same set of addresses (how large that set should be is an
>>>     open question) with the same keys, making the fakes more believable
>>>     (observer might think that these are real nodes, maintaining their
>>>     real HELLOs over time; failure to validate any of them might be
>>> blamed
>>>     on firewalls, etc).
>>>     Address sets will intersect (A1 and A2 generated from K1 and K2 may
>>>     share some elements), obviously, although that might not be true for
>>>     IPv6 addresses...
>>>     I expect that address generator will apply some rules to generate
>>>     believable addresses (i.e. don't generate invalid IP addresses, like
>>>     10.1.0.255).
>>>     As an extra, a node could validate generated addresses and do
>>>     non-agressive portscanning (or something similar - we're not speaking
>>>     only of tcp) on them, to be able to add ports (or other parts of the
>>>     address) that look believable to observers.
>>>
>>>     AFAIU, right now nodes won't gossip about fake HELLOs (i.e. a node
>>>     will never tell another node about a HELLO it got, unless it
>>> validated
>>>     that HELLO). That might need to be changed to allow nodes to choose a
>>>     random subset of invalid HELLOs and gossip about them as well.
>>>     Otherwise only the node that generated them will be able to spread
>>> them.
>>>     Not sure about hostlists.
>>>
>>>     Extra yummy feature - add user-configurable fake templates, which
>>>     could have addresses only, or addresses and private keys. GNUnet node
>>>     will use templates from time to time (configurable) instead of
>>>     generated addresses, and will generate missing template elements.
>>>     It would be neat to be able to tell the world that 65.55.58.201 [1]
>>>     runs a GNUnet http_server transport on port 80...
>>>
>>
>> This is also too complex
>>
>>>
>>>
>> ______________________________**_________________
>> GNUnet-developers mailing list
>> GNUnet-developers@gnu.org
>> https://lists.gnu.org/mailman/**listinfo/gnunet-developers<https://lists.gnu.org/mailman/listinfo/gnunet-developers>
>>
>
>
_______________________________________________
GNUnet-developers mailing list
GNUnet-developers@gnu.org
https://lists.gnu.org/mailman/listinfo/gnunet-developers

Reply via email to