From ddc341e4776f97e982f5ea2b90149212624d7e7c Mon Sep 17 00:00:00 2001 From: zzz Date: Sun, 14 Nov 2010 11:45:58 +0000 Subject: [PATCH] reference new DHT paper --- www.i2p2/pages/how_networkdatabase.html | 36 +++++++++++++++++++++++-- www.i2p2/pages/how_threatmodel.html | 28 ++++++++++++++++++- 2 files changed, 61 insertions(+), 3 deletions(-) diff --git a/www.i2p2/pages/how_networkdatabase.html b/www.i2p2/pages/how_networkdatabase.html index 61f2d6ca..3896290f 100644 --- a/www.i2p2/pages/how_networkdatabase.html +++ b/www.i2p2/pages/how_networkdatabase.html @@ -3,7 +3,7 @@ {% block content %}

- Updated July 2010, current as of router version 0.8 + Updated November 2010, current as of router version 0.8.1

Overview

@@ -557,7 +557,7 @@

-

Sybil Attack (Full Keyspace)

+

Sybil Attack (Full Keyspace)

An attacker may mount a Sybil attack @@ -703,6 +703,38 @@ This attack becomes more difficult as the network size grows. for a discussion of the vulnerabilities of peer selection for tunnels.

+

Information Leaks

+

+ (Reference: + In Search of an Anonymouns and Secure Lookup Section 3) +

+

+ This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN. + At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN + is significantly different from that in I2P. Second, I2P's network database lookups are only + loosely correlated to the peer selection and + tunnel building processes; only previously-known peers + are used for tunnels. + Also, peer selection is unrelated to any notion of DHT key-closeness. +

+

+ Some of this may actually be more interesting when the I2P network gets much larger. + Right now, each router knows a large proportion of the network, so looking up a particular + Router Info in the network database is not strongly indicative of a future intent to use + that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be + more correlative. Of course, a larger network makes a Sybil attack that much harder. +

+

+ However, the general issue of DHT information leakage in I2P needs further investigation. + The floodfill routers are in a position to observe queries and gather information. + Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper) + we expect that many of the Sybil threats we describe + (here, + here and + here) + become problematic for several reasons. +

+

History

diff --git a/www.i2p2/pages/how_threatmodel.html b/www.i2p2/pages/how_threatmodel.html index cefbb3d2..47311b51 100644 --- a/www.i2p2/pages/how_threatmodel.html +++ b/www.i2p2/pages/how_threatmodel.html @@ -2,7 +2,7 @@ {% block title %}I2P's Threat Model{% endblock %} {% block content %} -Updated August 2010, current as of router version 0.8 +Updated November 2010, current as of router version 0.8.1

What do we mean by "anonymous"?

Your level of anonymity can be described as "how hard it is for someone @@ -105,6 +105,7 @@ to review.

  • Harvesting attacks
  • Identification Through Traffic Analysis
  • Sybil attacks
  • +
  • Buddy Exhaustion attacks
  • Cryptographic attacks
  • Floodfill attacks
  • Other Network Database attacks
  • @@ -206,6 +207,10 @@ Partial defenses implemented in I2P: Limits on the number of tunnels routed through a single peer
  • Prevention of peers from the same /16 IP range from being members of a single tunnel +
  • +For eepsites or other hosted services, we support +simultaneous hosting on multiple routers, or +multihoming
  • Even in total, these defenses are not a complete solution. @@ -504,6 +509,27 @@ for more Sybil discussion.

    +

    Buddy Exhaustion attacks

    +

    + (Reference: + In Search of an Anonymouns and Secure Lookup Section 5.2) +

    +

    +By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure +that a tunnel is formed wholly from its set of colluding routers. +The chances of success are enhanced if there is a large number of colluding routers, +i.e. a Sybil attack. +This is somewhat mitigated by our +peer profiling methods used to monitor the performance +of peers. +However, this is a powerful attack as the number of routers approaches +f = 0.2, or 20% malicious nodes, as specifed in the paper. +The malicous routers could also maintain connections to the target router and provide +excellent forwarding bandwidth for traffic over those connections, in an attempt +to manipulate the profiles managed by the target and appear attractive. +Further research and defenses may be necessary. +

    +

    Cryptographic attacks