2011-04-11 21:51:36 +00:00
|
|
|
{% extends "_layout_fr.html" %}
|
2011-04-12 08:58:01 +00:00
|
|
|
{% block title %}Modèle des menaces pour I2P{% endblock %}
|
2011-04-11 21:43:55 +00:00
|
|
|
{% block content %}
|
2011-04-12 08:58:01 +00:00
|
|
|
Traduction d'avril 2011 (en cours). <a href="how_threatmodel.html">Version anglaise actuelle</a><br /><br />
|
2011-04-11 21:51:36 +00:00
|
|
|
Mise à jour de novembre 2010, valide pour la version 0.8.1 du routeur
|
|
|
|
<h2>Ce que nous entendons par "anonyme"</h2>
|
2011-04-11 21:43:55 +00:00
|
|
|
|
2011-04-11 21:59:41 +00:00
|
|
|
<p>Votre niveau d'anonymat peut se définir par "la difficulté que quelqu'un rencontrera pour trouver des informations
|
|
|
|
vous concernant que vous ne voulez pas qu'il connaisse" - qui vous êtes, où vous vous trouvez, avec qui vous
|
2011-04-12 09:46:05 +00:00
|
|
|
communiquez, ou même quand. L'anonymat "parfait" n'est ici un concept ni pertinent ni utile : un logiciel ne vous
|
|
|
|
rendra pas indiscernable par des gens qui n'utilisent ni ordinateur ni Internet. Nous travaillons plutôt à produire
|
|
|
|
l'anonymat suffisant aux besoins réels, dans la mesure du possible, de qui que ce soit - de ceux qui se promènent
|
|
|
|
simplement sur Internet, à ceux qui échangent des données, jusqu'à ceux inquiets de l'intrusion des organisations et
|
|
|
|
des états.</p>
|
|
|
|
|
2011-04-11 22:58:00 +00:00
|
|
|
<p>La réponse à la question de savoir si I2P apportera un anonymat suffisant à vos besoins particuliers est difficile,
|
|
|
|
mais nous espérons que cette page vous éclairera en passant en revue les diverses menaces.</p>
|
2011-04-11 21:43:55 +00:00
|
|
|
|
2011-04-12 09:46:05 +00:00
|
|
|
<p>Nous accueillons avec bienveillance toutes recherches et analyses supplémentaires sur la résistance d'I2P aux
|
|
|
|
menaces décrites ci-dessous. Nous avons besoin de plus de recherche sur la littérature existante (dont la plus grande
|
|
|
|
partie est focalisée sur Tor), ainsi que de travaux originaux.</p>
|
2011-04-11 21:43:55 +00:00
|
|
|
|
2011-04-11 22:58:00 +00:00
|
|
|
<h2>Résumé de la topologie du réseau</h2>
|
|
|
|
<p>I2P germe des idées de nombreux <a href="how_networkcomparisons">autres</a> <a href="links_fr">systèmes</a>, mais
|
|
|
|
il faut garder à l'esprit un petit nombre de points essentiels quand on examine la littérature concernée :</p><ul>
|
|
|
|
<li><b>I2P est un réseau croisé sur routes libres</b> - le créateur du message définit explicitement le chemin par
|
|
|
|
lequel celui-ci sera envoyé (le tunnel sortant), et le destinataire du message définit explicitement le chemin par
|
|
|
|
lequel le message sera reçu (le tunnel entrant).
|
2011-04-11 21:43:55 +00:00
|
|
|
</li>
|
2011-04-12 09:46:05 +00:00
|
|
|
<li><b>I2P n'a aucuns points d'entrée ou de sortie officiels</b> - tous les pairs participent intégralement au
|
|
|
|
maillage, et il n'y a pas de mandataires entrants ou sortants au niveau de la couche réseau (il en existe cependant
|
|
|
|
quelques-uns au niveau de la couche application)</li>
|
2011-04-12 06:59:23 +00:00
|
|
|
<li><b>I2P est entièrement décentralisé</b> - il n'y a pas de contrôles ou d'autorités centrales : quelqu'un pourrait,
|
|
|
|
sans briser la compatibilité avec le reste du réseau, modifier quelques routeurs en vue de contrôler une partie de la
|
2011-04-12 09:46:05 +00:00
|
|
|
chaîne de maillage (en construisant les tunnels et en maîtrisant les clés nécessaires au pilotage du transfert au
|
|
|
|
niveau du point terminal du tunnel) ou élaborer une sélection basée sur un profilage des informations d'annuaire, mais
|
|
|
|
ceci n'est bien sûr pas nécessaire (et pourrait même réduire son anonymat à néant).</li>
|
2011-04-11 21:43:55 +00:00
|
|
|
</ul>
|
|
|
|
<p>
|
2011-04-12 06:59:23 +00:00
|
|
|
Nous avons des plans documentés de mise en œuvre de <a href="todo_fr#stop">retards conséquents</a> et
|
|
|
|
de <a href="todo_fr#batching">stratégies traitements par lots</a> dont l'existence et le détail des modalités ne sont
|
|
|
|
connus que par le saut ou la passerelle de tunnel particuliers qui reçoivent le message, pour permettre au réseau
|
|
|
|
(croisé à basse latence dans sa caractéristique principale) de fournir un trafic de camouflage aux communications de
|
|
|
|
latence plus élevée (p.ex. les e-mails). Nous savons que l'introduction de retards élevés est requise pour assurer une
|
|
|
|
protection significative, et que son implémentation sera une épreuve sérieuse. Il n'est cependant pas actuellement
|
2011-04-12 08:58:01 +00:00
|
|
|
certain que nous solliciterons ces méthodes de retardement.</p>
|
|
|
|
<p>
|
|
|
|
En théorie, des routeurs situés sur le chemin du message pourraient injecter un nombre arbitraire de sauts
|
|
|
|
supplémentaires avant de transférer le message au pairs suivant. L'implémentation actuelle ne le fait pas.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
|
2011-04-12 08:58:01 +00:00
|
|
|
<h2>Le modèle de menaces (Attaques)</h2>
|
2011-04-11 21:43:55 +00:00
|
|
|
<p>
|
2011-04-12 08:58:01 +00:00
|
|
|
La conception d'I2P a commencé en 2003, juste après l'apparition de l'
|
|
|
|
<a href="http://www.onion-router.net">[Onion Routing]</a>, de <a href="http://freenetproject.org/">[Freenet]</a>, et de
|
|
|
|
<a href="http://www.torproject.org/">[Tor]</a>. Notre conception tire de substantiels bénéfices des recherches publiées
|
|
|
|
à cette époque. I2P utilise plusieurs des techniques du routage en oignon, et continue de bénéficier de l'intérêt que
|
|
|
|
Tor suscite dans la recherche théorique.</p>
|
|
|
|
<p>
|
|
|
|
Inspirée des attaques et analyses mises en avant dans <a href="http://freehaven.net/anonbib/topic.html">littérature</a>
|
|
|
|
(particulièrement <a href="http://citeseer.ist.psu.edu/454354.html">Traffic Analysis: Protocols, Attacks, Design Issues
|
|
|
|
and Open Problems</a>), la suite décrit brièvement un large éventail d'attaques et plusieurs des contre-mesures prises
|
|
|
|
par I2P. Nous tenons à jour cette liste pour y ajouter les nouvelles attaques au fur et à mesure de leurs découvertes.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p><p>
|
2011-04-12 08:58:01 +00:00
|
|
|
Nous y adjoignons quelques attaques spécifiques à I2P. Nous n'avons pas de réponse adaptée à chacune d'elles, mais nous
|
|
|
|
poursuivons nos recherches et fourbissons nos défenses.</p>
|
|
|
|
<p>
|
|
|
|
De plus, plusieurs de ces attaques sont d'autant plus potentiellement réalisables que la taille du réseau est
|
2011-04-12 09:46:05 +00:00
|
|
|
actuellement modeste. Bien que nous soyons au courant de quelques limitations qui restent à résoudre, I2P est conçu
|
|
|
|
pour accueillir des centaines de millier et même des millions de participants. Au fur et à mesure de la croissance du
|
|
|
|
réseau, ces attaques deviendront de plus en plus difficiles à monter.</p>
|
2011-04-12 08:58:01 +00:00
|
|
|
<p>
|
|
|
|
Les pages sur la <a href="how_networkcomparisons.html">comparaison des réseaux</a> et la
|
|
|
|
<a href="how_garlicrouting.html">terminologie des "gousses d'ail"</a> apportent aussi un éclairage complémentaire.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
<h3 id="index">Index</h3>
|
|
|
|
<ul>
|
2011-04-12 08:58:01 +00:00
|
|
|
<li><a href="#bruteforce">Force brute</a></li>
|
|
|
|
<li><a href="#timing">Attaques de timing</a></li>
|
|
|
|
<li><a href="#intersection">Attaques d'intersection</a></li>
|
|
|
|
<li><a href="#dos">Deni de service</a></li>
|
|
|
|
<li><a href="#tagging">Attaques par marquage</a></li>
|
|
|
|
<li><a href="#partitioning">Attaques par cloisonnement</a></li>
|
|
|
|
<li><a href="#predecessor">Attaques de prédécesseur</a></li>
|
|
|
|
<li><a href="#harvesting">Attaques de collecte</a></li>
|
|
|
|
<li><a href="#traffic">Identification via l'analyse du trafic</a></li>
|
|
|
|
<li><a href="#sybil">Attaques de Sibylle</a></li>
|
|
|
|
<li><a href="#buddy">Attaques de listage d'amis</a></li>
|
|
|
|
<li><a href="#crypto">Attaques cryptographiques</a></li>
|
|
|
|
<li><a href="#floodfill">Attaques d'innondation</a></li>
|
|
|
|
<li><a href="#netdb">Autres attaques de base de données</a></li>
|
|
|
|
<li><a href="#central">Attaques des ressources centralisées</a></li>
|
|
|
|
<li><a href="#dev">Attaques de développement</a></li>
|
|
|
|
<li><a href="#impl">Attaques d'implémentation</a></li>
|
2011-04-11 21:43:55 +00:00
|
|
|
</ul>
|
|
|
|
|
2011-04-12 08:58:01 +00:00
|
|
|
<h3 id="bruteforce">Force brute</h3>
|
2011-04-11 21:43:55 +00:00
|
|
|
|
2011-04-12 08:58:01 +00:00
|
|
|
<p>Une attaque en force brute peut être montée par un adversaire global passif ou actif qui surveillerait tous les
|
|
|
|
transferts de messages entre tous le nœuds et tenterait d'établir une corrélation entre les messages et les chemins
|
|
|
|
qu'ils empruntent. Le montage d'une attaque de ce type contre I2P ne serait pas une mince affaire car tous les pairs du
|
2011-04-12 09:46:05 +00:00
|
|
|
réseau envoient souvent des messages (tant de bout en bout que d'entretien du réseau), sans compter les changements de
|
|
|
|
taille et de données des messages tout au long de leur transit d'un bout à l'autre. de plus, l'attaquant externe n'a
|
|
|
|
pas accès au messages, car la communication inter-router est à la fois cryptée et envoyée comme un flux (ce qui rend
|
|
|
|
deux messages de 1024 bits indiscernables d'un message de 2048 bits).</p>
|
|
|
|
|
|
|
|
<p>Cependant, un attaquant puissant peut utiliser la force brute pour détecter des tendances - s'il peut envoyer 5 Go à
|
|
|
|
une destination I2P et surveiller toutes les connexions du réseau, il peut éliminer les pairs qui n'ont pas reçu 5 Go.
|
|
|
|
Il existe des techniques pour déjouer cette attaque, mais elle serait prohibitive (voir :
|
|
|
|
<a href="http://citeseer.ist.psu.edu/freedman02tarzan.html">Tarzan</a> et sa simulation de trafic à taux constant). La
|
|
|
|
plupart des utilisateurs ne craignent pas cette attaque à cause de son extrême coût de montage (et du fait qu'elle
|
|
|
|
nécessiterait à coup sûr un comportement légalement répréhensible). Elle est malgré tout envisageable au niveau d'un
|
|
|
|
gros FAI ou d'un point d'échange Internet. Ceux qui veulent y parer devraient prendre des mesure conservatoires, telles
|
|
|
|
que régler de faibles limites de bande passante et l'utilisation de jeux de baux cryptés ou non publiés pour les sites
|
|
|
|
eep. D'autre contre-mesures comme les retards volontaires et les routes privées ne sont pas implémentées actuellement.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p><p>
|
2011-04-12 09:46:05 +00:00
|
|
|
En tant que protection partielle envers un seul routeur ou un groupe de routeurs qui tenteraient de router tout le
|
|
|
|
trafic du réseau, le routeur contient des limites quand au nombre de tunnels pouvant être routés par un seul pair.
|
2011-04-11 21:43:55 +00:00
|
|
|
As the network grows, these limits are subject to further adjustment.
|
2011-04-12 09:46:05 +00:00
|
|
|
D'autres mécanismes d'évaluation, de sélection et d'évitement des pairs sont approfondis la page
|
|
|
|
<a href="how_peerselection.html">sélection des pairs</a>.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="timing">Timing attacks</h3>
|
|
|
|
|
|
|
|
<p>I2P's messages are unidirectional and do not necessarily imply that a reply
|
|
|
|
will be sent. However, applications on top of I2P will most likely have
|
|
|
|
recognizable patterns within the frequency of their messages - for instance, an
|
|
|
|
HTTP request will be a small message with a large sequence of reply messages
|
|
|
|
containing the HTTP response. Using this data as well as a broad view of the
|
|
|
|
network topology, an attacker may be able to disqualify some links as being too
|
|
|
|
slow to have passed the message along.</p>
|
|
|
|
|
|
|
|
<p>This sort of attack is powerful, but its applicability to I2P is non obvious,
|
|
|
|
as the variation on message delays due to queuing, message processing, and
|
|
|
|
throttling will often meet or exceed the time of passing a message along a
|
|
|
|
single link - even when the attacker knows that a reply will be sent as soon as
|
|
|
|
the message is received. There are some scenarios which will expose fairly
|
|
|
|
automatic replies though - the streaming library does (with the SYN+ACK) as does the
|
|
|
|
message mode of guaranteed delivery (with the DataMessage+DeliveryStatusMessage).</p>
|
|
|
|
|
|
|
|
<p>Without protocol scrubbing or higher latency, global active adversaries can
|
|
|
|
gain substantial information. As such, people concerned with these attacks could
|
|
|
|
increase the latency (using <a href="todo#stop">nontrivial delays</a> or
|
|
|
|
<a href="todo#batching">batching strategies</a>), include protocol scrubbing, or
|
|
|
|
other advanced tunnel routing <a href="todo#batching">techniques</a>,
|
|
|
|
but these are unimplemented in I2P.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>References:
|
2011-04-12 09:46:05 +00:00
|
|
|
<a href="http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf">Low-Resource Routing
|
|
|
|
Attacks
|
|
|
|
Against Anonymous Systems</a>
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
<h3 id="intersection">Intersection attacks</h3>
|
|
|
|
|
|
|
|
<p>Intersection attacks against low latency systems are extremely powerful -
|
|
|
|
periodically make contact with the target and keep track of what peers are on
|
|
|
|
the network. Over time, as node churn occurs the attacker will gain
|
|
|
|
significant information about the target by simply intersecting the sets of
|
|
|
|
peers that are online when a message successfully goes through. The cost of
|
|
|
|
this attack is significant as the network grows, but may be feasible in some
|
|
|
|
scenarios.</p>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
In summary, if an attacker is at both ends of your tunnel at the same time,
|
|
|
|
he may be successful.
|
|
|
|
I2P does not have a full defense to this for low latency communication.
|
|
|
|
This is an inherent weakness of low-latency onion routing.
|
2011-04-12 09:46:05 +00:00
|
|
|
Tor provides a
|
|
|
|
<a href="https://trac.torproject.org/projects/tor/wiki/TheOnionRouter/TorFAQ#Whatattacksremainagainstonionrouting">
|
|
|
|
similar disclaimer</a>.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p><p>
|
|
|
|
Partial defenses implemented in I2P:
|
|
|
|
<ul><li>
|
|
|
|
<a href="tunnel-alt.html#ordering">strict ordering</a> of peers
|
|
|
|
</li><li>
|
|
|
|
<a href="how_peerselection.html">peer profiling and selection</a> from a small group that changes slowly
|
|
|
|
</li><li>
|
|
|
|
Limits on the number of tunnels routed through a single peer
|
|
|
|
</li><li>
|
|
|
|
Prevention of peers from the same /16 IP range from being members of a single tunnel
|
|
|
|
</li><li>
|
|
|
|
For eepsites or other hosted services, we support
|
|
|
|
simultaneous hosting on multiple routers, or
|
|
|
|
<a href="http://www.i2p2.i2p/how_threatmodel#intersection">multihoming</a>
|
|
|
|
</li></ul>
|
|
|
|
|
|
|
|
Even in total, these defenses are not a complete solution.
|
|
|
|
Also, we have made some design choices that may significantly increase our vulnerability:
|
|
|
|
<ul><li>
|
|
|
|
We do not use low-bandwidth "guard nodes"
|
|
|
|
</li><li>
|
|
|
|
We use tunnel pools comprised of several tunnels, and traffic can shift from tunnel to tunnel.
|
|
|
|
</li><li>
|
|
|
|
Tunnels are not long-lived; new tunnels are built every 10 minutes.
|
|
|
|
</li><li>
|
|
|
|
Tunnel lengths are configurable.
|
|
|
|
While 3-hop tunnels are recommended for full protection, several applications and
|
|
|
|
services use 2-hop tunnels by default.
|
|
|
|
</li></ul>
|
|
|
|
|
|
|
|
|
|
|
|
</p><p>
|
|
|
|
In the future, it could
|
|
|
|
for peers who can afford significant delays (per <a href="todo#stop">nontrivial
|
|
|
|
delays</a> and <a href="todo#batching">batching strategies</a>). In addition,
|
|
|
|
this is only relevant for destinations that other people know about - a private
|
|
|
|
group whose destination is only known to trusted peers does not have to worry,
|
|
|
|
as an adversary can't "ping" them to mount the attack.</p>
|
|
|
|
|
|
|
|
<p>Reference:
|
|
|
|
<a href="http://blog.torproject.org/blog/one-cell-enough">One Cell Enough</a>
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="dos">Denial of service attacks</h3>
|
|
|
|
|
|
|
|
<p>There are a whole slew of denial of service attacks available against I2P,
|
|
|
|
each with different costs and consequences:</p><ul>
|
|
|
|
<li><b>Greedy user attack:</b> This is simply
|
|
|
|
people trying to consume significantly more resources than they are
|
|
|
|
willing to contribute. The defense against this is:<ul>
|
|
|
|
<li>Set defaults so that most users provide resources to the network.
|
|
|
|
In I2P, users route traffic by default. In sharp distinction to
|
|
|
|
<a href="https://torproject.org/">other networks</a>,
|
|
|
|
over 95% of I2P users relay traffic for others.
|
|
|
|
</li>
|
|
|
|
<li>Provide easy configuration options so that users may increase their
|
|
|
|
contribution (share percentage) to the network. Display easy-to-understand
|
|
|
|
metrics such as "share ratio" so that users may see what they are contributing.
|
|
|
|
</li><lil>
|
|
|
|
Maintain a strong community with blogs, forums, IRC, and other means of communication.
|
|
|
|
</li></ul>
|
|
|
|
<li><b>Starvation attack:</b> A hostile user may attempt to harm the network by
|
|
|
|
creating a significant number of peers in the network who are not identified as
|
|
|
|
being under control of the same entity (as with Sybil). These nodes then
|
|
|
|
decide not to provide any resources to the network, causing existing peers
|
|
|
|
to search through a larger network database or request more tunnels than
|
|
|
|
should be necessary.
|
|
|
|
Alternatively, the nodes may provide intermittent service by periodically
|
|
|
|
dropping selected traffic, or refusing connections to certain peers.
|
|
|
|
This behavior may be indistinguishable from that of a heavily-loaded or failing node.
|
|
|
|
I2P addresses these issues by maintaining <a href="how_peerselection.html">profiles</a> on the
|
|
|
|
peers, attempting to identify underperforming ones and simply ignoring
|
|
|
|
them, or using them rarely.
|
|
|
|
We have significantly enhanced the
|
|
|
|
ability to recognize and avoid troublesome peers; however there are still
|
|
|
|
significant efforts required in this area.
|
|
|
|
</li>
|
|
|
|
<li><b>Flooding attack:</b> A hostile user may attempt to flood the network,
|
|
|
|
a peer, a destination, or a tunnel. Network and peer flooding is possible,
|
|
|
|
and I2P does nothing to prevent standard IP layer flooding. The flooding of
|
|
|
|
a destination with messages by sending a large number to the target's various
|
|
|
|
inbound tunnel gateways is possible, but the destination will know this both
|
|
|
|
by the contents of the message and because the tunnel's tests will fail. The
|
|
|
|
same goes for flooding just a single tunnel. I2P has no defenses for a network
|
|
|
|
flooding attack. For a destination and tunnel flooding attack, the target
|
|
|
|
identifies which tunnels are unresponsive and builds new ones. New code could
|
|
|
|
also be written to add even more tunnels if the client wishes to handle the
|
|
|
|
larger load. If, on the other hand, the load is more than the client can
|
|
|
|
deal with, they can instruct the tunnels to throttle the number of messages or
|
|
|
|
bytes they should pass on (once the <a href="todo#batching">advanced tunnel
|
|
|
|
operation</a> is implemented).</li>
|
|
|
|
<li><b>CPU load attack:</b> There are currently some methods for people to
|
|
|
|
remotely request that a peer perform some cryptographically expensive
|
|
|
|
operation, and a hostile attacker could use these to flood that peer with
|
|
|
|
a large number of them in an attempt to overload the CPU. Both using good
|
|
|
|
engineering practices and potentially requiring nontrivial certificates
|
|
|
|
(e.g. HashCash) to be attached to these expensive requests should mitigate
|
|
|
|
the issue, though there may be room for an attacker to exploit various
|
|
|
|
bugs in the implementation.</li>
|
|
|
|
<li id="ffdos"><b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by
|
|
|
|
becoming a floodfill router. The current defenses against unreliable,
|
|
|
|
intermittent, or malicious floodfill routers are poor.
|
|
|
|
A floodfill router may provide bad or no response to lookups, and
|
|
|
|
it may also interfere with inter-floodfill communication.
|
|
|
|
Some defenses and
|
|
|
|
<a href="how_peerselection">peer profiling</a> are implemented,
|
|
|
|
however there is much more to do.
|
|
|
|
For more information see the
|
|
|
|
<a href="how_networkdatabase.html#threat">network database page</a>.
|
|
|
|
</li>
|
|
|
|
</ul>
|
|
|
|
|
|
|
|
<h3 id="tagging">Tagging attacks</h3>
|
|
|
|
<p>Tagging attacks - modifying a message so that it can later be identified
|
|
|
|
further along the path - are by themselves impossible in I2P, as messages
|
|
|
|
passed through tunnels are signed. However, if an attacker is the inbound
|
|
|
|
tunnel gateway as well as a participant further along in that tunnel, with
|
|
|
|
collusion they can identify the fact that they are in the same tunnel (and
|
|
|
|
prior to adding <a href="todo#tunnelId">unique hop ids</a> and other updates,
|
|
|
|
colluding peers within the same tunnel can recognize that fact without any
|
|
|
|
effort). An attacker in an outbound tunnel and any part of an inbound tunnel cannot
|
|
|
|
collude however, as the tunnel encryption pads and modifies the data separately
|
|
|
|
for the inbound and outbound tunnels. External attackers cannot do anything,
|
|
|
|
as the links are encrypted and messages signed.</p>
|
|
|
|
|
|
|
|
<h3 id="partitioning">Partitioning attacks</h3>
|
|
|
|
|
|
|
|
<p>Partitioning attacks - finding ways to segregate (technically or analytically)
|
|
|
|
the peers in a network - are important to keep in mind when dealing with a
|
|
|
|
powerful adversary, since the size of the network plays a key role in determining
|
|
|
|
your anonymity. Technical partitioning by cutting links between peers to create
|
|
|
|
fragmented networks is addressed by I2P's built in network database, which
|
|
|
|
maintains statistics about various peers so as to allow any existing connections
|
|
|
|
to other fragmented sections to be exploited so as to heal the network. However,
|
|
|
|
if the attacker does disconnect all links to uncontrolled peers, essentially
|
|
|
|
isolating the target, no amount of network database healing will fix it. At
|
|
|
|
that point, the only thing the router can hope to do is notice that a significant
|
|
|
|
number of previously reliable peers have become unavailable and alert the client
|
|
|
|
that it is temporarily disconnected (this detection code is not implemented at
|
|
|
|
the moment).</p>
|
|
|
|
|
|
|
|
<p>Partitioning the network analytically by looking for differences in how routers
|
|
|
|
and destinations behave and grouping them accordingly is also a very powerful
|
|
|
|
attack. For instance, an attacker <a href="#harvesting">harvesting</a> the network
|
|
|
|
database will know when a particular destination has 5 inbound tunnels in their
|
|
|
|
LeaseSet while others have only 2 or 3, allowing the adversary to potentially
|
|
|
|
partition clients by the number of tunnels selected. Another partition is
|
|
|
|
possible when dealing with the <a href="todo#stop">nontrivial delays</a> and
|
|
|
|
<a href="todo#batching">batching strategies</a>, as the tunnel gateways and the
|
|
|
|
particular hops with non-zero delays will likely stand out. However, this data
|
|
|
|
is only exposed to those specific hops, so to partition effectively on that
|
|
|
|
matter, the attacker would need to control a significant portion of the network
|
|
|
|
(and still that would only be a probabilistic partition, as they wouldn't know
|
|
|
|
which other tunnels or messages have those delays).
|
|
|
|
</p><p>
|
|
|
|
Also discussed on the
|
|
|
|
<a href="how_networkdatabase.html#threat">network database page</a> (bootstrap attack).
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<h3 id="predecessor">Predecessor attacks</h3>
|
|
|
|
|
|
|
|
<p>The predecessor attack is passively gathering statistics in an attempt to see
|
|
|
|
what peers are 'close' to the destination by participating in their tunnels and
|
|
|
|
keeping track of the previous or next hop (for outbound or inbound tunnels,
|
|
|
|
respectively). Over time, using a perfectly random sample of peers and random
|
|
|
|
ordering, an attacker would be able to see which peer shows up as 'closer'
|
|
|
|
statistically more than the rest, and that peer would in turn be where the
|
|
|
|
target is located. </p>
|
|
|
|
|
|
|
|
<p>I2P avoids this in four ways: first, the peers selected to participate in
|
|
|
|
tunnels are not randomly sampled throughout the network - they are derived from
|
|
|
|
the <a href="how_peerselection">peer selection</a> algorithm which breaks them
|
|
|
|
into tiers. Second, with <a href="tunnel-alt.html#ordering">strict ordering</a> of peers
|
|
|
|
in a tunnel, the fact that a peer shows up more frequently does not mean they're
|
|
|
|
the source. Third, with <a href="tunnel-alt.html#length">permuted tunnel length</a>
|
|
|
|
(not enabled by default)
|
|
|
|
even 0 hop tunnels can provide plausible deniability as the occasional
|
|
|
|
variation of the gateway will look like normal tunnels. Fourth, with
|
|
|
|
<a href="todo#fullRestrictedRoutes">restricted routes</a> (unimplemented), only the peer with
|
|
|
|
a restricted connection to the target will ever contact the target, while
|
|
|
|
attackers will merely run into that gateway.
|
|
|
|
</p><p>
|
|
|
|
The current
|
|
|
|
<a href="tunnel-alt-creation.html">tunnel build method</a>
|
|
|
|
was specifically designed to combat the predecessor attack.
|
|
|
|
See also <a href="#intersection">the intersection attack</a>.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>References:
|
2011-04-12 09:46:05 +00:00
|
|
|
<a href="http://prisms.cs.umass.edu/brian/pubs/wright.tissec.2008.pdf">
|
|
|
|
http://prisms.cs.umass.edu/brian/pubs/wright.tissec.2008.pdf</a>
|
2011-04-11 21:43:55 +00:00
|
|
|
which is an update to the 2004 predecessor attack paper
|
2011-04-12 09:46:05 +00:00
|
|
|
<a href="http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf">
|
|
|
|
http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf</a>.
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="harvesting">Harvesting attacks</h3>
|
|
|
|
<p>
|
|
|
|
"Harvesting" means compiling a list of users running I2P.
|
|
|
|
It can be used for legal attacks and to help
|
|
|
|
other attacks by simply running a peer, seeing who it connects to, and
|
|
|
|
harvesting whatever references to other peers it can find.
|
|
|
|
</p><p>
|
|
|
|
I2P itself is not designed with effective defenses against
|
|
|
|
this attack, since there is the distributed network database
|
|
|
|
containing just this information.
|
|
|
|
The following factors make the attack somewhat harder in practice:
|
|
|
|
<ul><li>
|
|
|
|
Network growth will make it more difficult to obtain a given proportion of the network
|
|
|
|
</li><li>
|
|
|
|
Floodfill routers implement query limits as DOS protection
|
|
|
|
</li><li>
|
|
|
|
"Hidden mode", which prevents a router from publishing its information to the netDb,
|
|
|
|
(but also prevents it from relaying data) is not widely used now but could be.
|
|
|
|
</li></ul>
|
|
|
|
In future implementations,
|
|
|
|
<a href="todo#nat">basic</a> and
|
|
|
|
<a href="todo#fullRestrictedRoutes">comprehensive</a> restricted routes,
|
|
|
|
this attack loses much of its power, as the "hidden" peers do not publish their
|
|
|
|
contact addresses in the network database - only the tunnels through which
|
|
|
|
they can be reached (as well as their public keys, etc).
|
|
|
|
</p><p>
|
|
|
|
In the future, routers could use GeoIP to identify if they are in a particular
|
|
|
|
country where identification as an I2P node would be risky.
|
|
|
|
In that case, the router could automatically enable hidden mode, or
|
|
|
|
enact other restricted route methods.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="traffic">Identification Through Traffic Analysis</h3>
|
|
|
|
<p>
|
|
|
|
By inspecting the traffic into and out of a router, a malicious ISP
|
|
|
|
or state-level firewall could identify that a computer is running I2P.
|
|
|
|
As discussed <a href="#harvesting">above</a>, I2P is not specifically designed
|
|
|
|
to hide that a computer is running I2P. However, several design decisions made
|
|
|
|
in the design of the
|
|
|
|
<a href="transport.html">transport layer and protocols</a>
|
|
|
|
make it somewhat difficult to identify I2P traffic:
|
|
|
|
<ul><li>
|
|
|
|
Random port selection
|
|
|
|
</li><li>
|
|
|
|
Point-to-Point Encryption of all traffic
|
|
|
|
</li><li>
|
|
|
|
DH key exchange with no protocol bytes or other unencrypted constant fields
|
|
|
|
</li><li>
|
|
|
|
Simultaneous use of both
|
|
|
|
<a href="ntcp.html">TCP</a> and
|
|
|
|
<a href="udp.html">UDP</a> transports.
|
|
|
|
UDP may be much harder for some Deep Packet Inspection (DPI) equipment to track.
|
|
|
|
</li></ul>
|
|
|
|
|
2011-04-12 09:46:05 +00:00
|
|
|
In the near future, we plan to directly address traffic analysis issues by further obfuscation of I2P transport
|
|
|
|
protocols, possibly including:
|
2011-04-11 21:43:55 +00:00
|
|
|
<ul><li>
|
|
|
|
Padding at the transport layer to random lengths, especially during the connection handshake
|
|
|
|
</li><li>
|
|
|
|
Study of packet size distribution signatures, and additional padding as necessary
|
|
|
|
</li><li>
|
|
|
|
Development of additional transport methods that mimic SSL or other common protocols
|
|
|
|
</li><li>
|
|
|
|
Review of padding strategies at higher layers to see how they affect packet sizes at the transport layer
|
|
|
|
</li><li>
|
|
|
|
Review of methods implemented by various state-level firewalls to block Tor
|
|
|
|
</li><li>
|
|
|
|
Working directly with DPI and obfuscation experts
|
|
|
|
</li></ul>
|
|
|
|
</p><p>
|
|
|
|
Reference:
|
2011-04-12 09:46:05 +00:00
|
|
|
<a href="http://www.cse.chalmers.se/%7Ejohnwolf/publications/hjelmvik_breaking.pdf">Breaking and Improving Protocol
|
|
|
|
Obfuscation</a>
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="sybil">Sybil attacks</h3>
|
|
|
|
|
|
|
|
<p>Sybil describes a category of attacks where the adversary creates arbitrarily
|
|
|
|
large numbers of colluding nodes and uses the increased numbers to help
|
|
|
|
mounting other attacks. For instance, if an attacker is in a network where peers
|
|
|
|
are selected randomly and they want an 80% chance to be one of those peers, they
|
|
|
|
simply create five times the number of nodes that are in the network and roll
|
|
|
|
the dice. When identity is free, Sybil can be a very potent technique for a
|
|
|
|
powerful adversary. The primary technique to address this is simply to make
|
|
|
|
identity 'non free' - <a href="http://www.pdos.lcs.mit.edu/tarzan/">Tarzan</a>
|
|
|
|
(among others) uses the fact that IP addresses are limited, while
|
|
|
|
IIP used
|
|
|
|
<a href="http://www.hashcash.org/">HashCash</a> to 'charge' for creating a new
|
|
|
|
identity. We currently have not implemented any particular technique to address
|
|
|
|
Sybil, but do include placeholder certificates in the router's and
|
|
|
|
destination's data structures which can contain a HashCash certificate of
|
|
|
|
appropriate value when necessary (or some other certificate proving scarcity).
|
|
|
|
</p><p>
|
|
|
|
Requiring HashCash Certificates in various places has two major problems:
|
|
|
|
<ul><li>
|
|
|
|
Maintaining backward compatibility
|
|
|
|
</li><li>
|
|
|
|
The classic HashCash problem -
|
|
|
|
selecting HashCash values that are meaningful proofs of work on high-end machines,
|
|
|
|
while still being feasible on low-end machines such as mobile devices.
|
|
|
|
</li></ul>
|
|
|
|
</p><p>
|
|
|
|
Various limitations on the number of routers in a given IP range restrict
|
|
|
|
the vulnerability to attackers that don't have the ability to put machines
|
|
|
|
in several IP blocks.
|
|
|
|
However, this is not a meaningful defense against a powerful adversary.
|
|
|
|
</p><p>
|
|
|
|
See the
|
|
|
|
<a href="how_networkdatabase.html#threat">network database page</a>
|
|
|
|
for more Sybil discussion.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="buddy">Buddy Exhaustion attacks</h3>
|
|
|
|
<p>
|
|
|
|
(Reference:
|
2011-04-12 09:46:05 +00:00
|
|
|
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymouns
|
|
|
|
and Secure Lookup</a> Section 5.2)
|
2011-04-11 21:43:55 +00:00
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure
|
|
|
|
that a tunnel is formed wholly from its set of colluding routers.
|
|
|
|
The chances of success are enhanced if there is a large number of colluding routers,
|
|
|
|
i.e. a <a href="#sybil">Sybil attack</a>.
|
|
|
|
This is somewhat mitigated by our
|
|
|
|
<a href="how_peerselection">peer profiling</a> methods used to monitor the performance
|
|
|
|
of peers.
|
|
|
|
However, this is a powerful attack as the number of routers approaches
|
|
|
|
<i>f</i> = 0.2, or 20% malicious nodes, as specifed in the paper.
|
|
|
|
The malicous routers could also maintain connections to the target router and provide
|
|
|
|
excellent forwarding bandwidth for traffic over those connections, in an attempt
|
|
|
|
to manipulate the profiles managed by the target and appear attractive.
|
|
|
|
Further research and defenses may be necessary.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="crypto">Cryptographic attacks</h3>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
We use strong cryptography with long keys, and
|
|
|
|
we assume the security of the industry-standard cryptographic primitives used in I2P, as documented
|
|
|
|
<a href="how_cryptography">on the low-level cryptography page</a>.
|
|
|
|
Security features
|
|
|
|
include the immediate detection of
|
|
|
|
altered messages along the path, the inability to decrypt messages not addressed to you,
|
|
|
|
and defense against man-in-the-middle attacks.
|
|
|
|
The key sizes chosen in 2003 were quite conservative at the time, and are still longer than
|
|
|
|
those used in <a href="https://torproject.org/">other anonymity networks</a>.
|
|
|
|
We don't think the current key lengths are our biggest weakness,
|
|
|
|
especially for traditional, non-state-level adversaries;
|
|
|
|
bugs and the small size of the network are much more worrisome.
|
|
|
|
Of course, all cryptographic algorithms eventually become obsolete due to
|
|
|
|
the advent of faster processors, cryptographic research, and advancements in
|
|
|
|
methods such as rainbow tables, clusters of video game hardware, etc.
|
|
|
|
Unfortunately, I2P was not designed with easy mechanisms to lengthen keys or change
|
|
|
|
shared secret values while maintaining backward compatibility.
|
|
|
|
</p><p>
|
|
|
|
Upgrading the various data structures and protocols to support longer keys
|
|
|
|
will have to be tackled eventually, and this will be a
|
|
|
|
<a href="how_cryptography">major undertaking</a>, just as it will be for
|
|
|
|
<a href="https://torproject.org/">others</a>.
|
|
|
|
Hopefully, through careful planning, we can minimize the disruption, and
|
|
|
|
implement mechanisms to make it easier for future transitions.
|
|
|
|
</p><p>
|
|
|
|
In the future,
|
|
|
|
several I2P protocols and data structures
|
|
|
|
support securely padding messages to arbitrary sizes, so messages could be made constant
|
|
|
|
size or garlic messages could be modified randomly so that some cloves appear to contain
|
|
|
|
more subcloves than they actually do. At the moment, however, garlic, tunnel, and
|
|
|
|
end to end messages include simple random padding.</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="floodfill">Floodfill Anonymity attacks</h3>
|
|
|
|
<p>
|
|
|
|
In addition to the floodfill DOS attacks described
|
|
|
|
<a href="#ffdos">above</a>, floodfill routers are uniquely positioned
|
|
|
|
to learn about network participants, due to their role
|
|
|
|
in the netDb, and the high frequency of communication with those participants.
|
|
|
|
This is somewhat mitigated because floodfill routers only manage a portion
|
|
|
|
of the total keyspace, and the keyspace rotates daily, as explained.
|
|
|
|
on the
|
|
|
|
<a href="how_networkdatabase.html#threat">network database page</a>.
|
|
|
|
The specific mechanisms by which routers communicate with floodfills have been
|
|
|
|
<a href="how_networkdatabase.html#delivery">carefully designed</a>.
|
|
|
|
However, these threats should be studied further.
|
|
|
|
The specific potential threats and corresponding defenses are a topic for future research.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="netdb">Other Network Database attacks</h3>
|
|
|
|
<p>
|
|
|
|
A hostile user may attempt to harm the network by
|
|
|
|
creating one or more floodfill routers and crafting them to offer
|
|
|
|
bad, slow, or no responses.
|
|
|
|
Several scenarios are discussed on the
|
|
|
|
<a href="how_networkdatabase.html#threat">network database page</a>.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="central">Central Resource Attacks</h3>
|
|
|
|
<p>
|
|
|
|
There are a few centralized or limited resources (some inside I2P, some not)
|
|
|
|
that could be attacked or used as a vector for attacks.
|
|
|
|
The absence of jrandom starting November 2007, followed by the loss of the i2p.net hosting service in January 2008,
|
|
|
|
highlighted numerous centralized resources in the development and operation of the I2P network,
|
|
|
|
most of which are now distributed.
|
|
|
|
Attacks on externally-reachable resources mainly affect the ability of new users to find us,
|
|
|
|
not the operation of the network itself.
|
|
|
|
<ul>
|
|
|
|
<li>The <a href="/">website</a> is mirrored and uses DNS round-robin for external public access.
|
|
|
|
<li>Routers now support <a href="faq.html#reseed">multiple external reseed locations</a>,
|
|
|
|
however more reseed hosts may be needed, and the handling of unreliable or malicious
|
|
|
|
reseed hosts may need improvement.
|
|
|
|
<li>Routers now support multiple update file locations.
|
|
|
|
A malicious update host could feed a huge file, need to limit the size.
|
|
|
|
<li>Routers now support multiple default trusted update signers.
|
|
|
|
<li>Routers now better handle <a href="#ffdos">multiple unreliable floodfill peers</a>.
|
|
|
|
Malicious floodfills <a href="#ffdos">needs</a> <a href="#floodfill">more</a> study.
|
|
|
|
<li>The code is now stored in a <a href="monotone.html">distributed source control system</a>.
|
|
|
|
<li>Routers rely on a single news host, but there is a hardcoded backup URL pointing to a different host.
|
|
|
|
A malicious news host could feed a huge file, need to limit the size.
|
|
|
|
<li><a href="naming.html">Naming system services</a>, including addressbook subscription providers, add-host services,
|
|
|
|
and jump services, could be malicious. Substantial protections for subscriptions were implemented
|
|
|
|
in release 0.6.1.31, with additional enhancements in subsequent releases.
|
|
|
|
However, all naming services require some measure of trust, see
|
|
|
|
<a href="naming.html">the naming page</a> for details.
|
|
|
|
<li>We remain reliant on the DNS service for i2p2.de, losing this would cause substantial
|
|
|
|
disruption in our ability to attract new users,
|
|
|
|
and would shrink the network (in the short-to-medium term), just as the loss of i2p.net did.
|
|
|
|
</ul>
|
|
|
|
|
|
|
|
|
|
|
|
<h3 id="dev">Development attacks</h3>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
These attacks aren't directly on the network, but instead go after its development team
|
|
|
|
by either introducing legal hurdles on anyone contributing to the development
|
|
|
|
of the software, or by using whatever means are available to get the developers to
|
|
|
|
subvert the software. Traditional technical measures cannot defeat these attacks, and
|
|
|
|
if someone threatened the life or livelihood of a developer (or even just issuing a
|
|
|
|
court order along with a gag order, under threat of prison), we would have a big problem.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<p>
|
|
|
|
However, two techniques help defend against these attacks:
|
|
|
|
<ul>
|
|
|
|
<li> All components of the network must be open source to enable inspection, verification,
|
|
|
|
modification, and improvement. If a developer is compromised, once it is noticed
|
|
|
|
the community should demand explanation and cease to accept that developer's work.
|
|
|
|
All checkins to our <a href="monotone.html">distributed source control system</a>
|
|
|
|
are cryptographically signed, and the release packagers use a trust-list system
|
|
|
|
to restrict modifications to those previously approved.
|
|
|
|
</li>
|
|
|
|
<li> Development over the network itself, allowing developers to stay anonymous but still
|
|
|
|
secure the development process. All I2P development can occur through I2P - using
|
|
|
|
a <a href="monotone.html">distributed source control system</a>,
|
|
|
|
a distributed source control system, IRC chat,
|
|
|
|
public web servers,
|
|
|
|
discussion forums (forum.i2p), and the software distribution sites,
|
|
|
|
all available within I2P.</li>
|
|
|
|
</ul>
|
|
|
|
We also maintain relationships with various organizations that offer legal advice,
|
|
|
|
should any defense be necessary.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
<h3 id="impl">Implementation attacks (bugs)</h3>
|
|
|
|
<p>
|
|
|
|
Try as we might, most nontrivial applications include errors in the design or
|
|
|
|
implementation, and I2P is no exception. There may be bugs that could be exploited to
|
|
|
|
attack the anonymity or security of the communication running over I2P in unexpected
|
|
|
|
ways. To help withstand attacks against the design or protocols in use, we publish
|
|
|
|
all designs and documentation and solicit review and criticism with
|
|
|
|
the hope that many eyes will improve the system.
|
|
|
|
We do not believe in
|
|
|
|
<a href="http://www.haystacknetwork.com/">security through obscurity</a>.
|
|
|
|
</p><p>
|
|
|
|
In addition, the code is being
|
|
|
|
treated the same way, with little aversion towards reworking or throwing out
|
|
|
|
something that isn't meeting the needs of the software system (including ease of
|
|
|
|
modification). Documentation for the design and implementation of the network and
|
|
|
|
the software components are an essential part of security, as without them it is
|
|
|
|
unlikely that developers would be willing to spend the time to learn the software
|
|
|
|
enough to identify shortcomings and bugs.
|
|
|
|
</p><p>
|
|
|
|
Our software is likely, in particular, to contain bugs related to denial of service
|
|
|
|
through out-of-memory errors (OOMs), cross-site-scripting (XSS) issues in the router console,
|
|
|
|
and other vulnerabilities to non-standard inputs via the various protocols.
|
|
|
|
</p><p>
|
|
|
|
I2P is still a small network with a small development community and almost no
|
|
|
|
interest from academic or research groups.
|
|
|
|
Therefore we lack the analysis that
|
|
|
|
<a href="https://torproject.org/">other anonymity networks</a>
|
|
|
|
may have received. We continue to recruit people to
|
|
|
|
<a href="getinvolved.html">get involved</a> and help.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<h2>Other Defenses</h2>
|
|
|
|
<h3 id="blocklist">Blocklists</h3>
|
|
|
|
<p>
|
|
|
|
To some extent, I2P could be enhanced to avoid peers operating at IP addresses
|
|
|
|
listed in a blocklist. Several blocklists are commonly available in standard formats,
|
|
|
|
listing anti-P2P organizations, potential state-level adversaries, and others.
|
|
|
|
<p>
|
|
|
|
To the extent that active peers actually do show up in the actual blocklist,
|
|
|
|
blocking by only a subset of peers would tend to segment the network,
|
|
|
|
exacerbate reachability problems, and decrease overall reliability.
|
|
|
|
Therefore we would want to agree on a particular blocklist and
|
|
|
|
enable it by default.
|
|
|
|
|
|
|
|
<p>
|
|
|
|
Blocklists are only a part (perhaps a small part) of an array of defenses
|
|
|
|
against maliciousness.
|
|
|
|
In large part the profiling system does a good job of measuring
|
|
|
|
router behavior so that we don't need to trust anything in netDb.
|
|
|
|
However there is more that can be done. For each of the areas in the
|
|
|
|
list above there are improvements we can make in detecting badness.
|
|
|
|
<p>
|
|
|
|
If a blocklist is hosted at a central location with automatic updates
|
|
|
|
the network is vulnerable to a
|
|
|
|
<a href="#central">central resource attack</a>.
|
|
|
|
Automatic subscription to a list gives the list provider the power to shut
|
|
|
|
the i2p network down. Completely.
|
|
|
|
<p>
|
|
|
|
Currently, a default blocklist is distributed with our software,
|
|
|
|
listing only the IPs of past DOS sources.
|
|
|
|
There
|
|
|
|
is no automatic update mechanism.
|
|
|
|
Should a particular IP range implement serious attacks on the I2P network,
|
|
|
|
we would have to ask people to update their blocklist manually through
|
|
|
|
out-of-band mechanisms such as forums, blogs, etc.
|
|
|
|
</p>
|
|
|
|
|
|
|
|
|
|
|
|
{% endblock %}
|