From ddc341e4776f97e982f5ea2b90149212624d7e7c Mon Sep 17 00:00:00 2001
From: zzz
- Updated July 2010, current as of router version 0.8
+ Updated November 2010, current as of router version 0.8.1
Overview
@@ -557,7 +557,7 @@
An attacker may mount a Sybil attack @@ -703,6 +703,38 @@ This attack becomes more difficult as the network size grows. for a discussion of the vulnerabilities of peer selection for tunnels.
++ (Reference: + In Search of an Anonymouns and Secure Lookup Section 3) +
++ This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN. + At first glance, these do not appear to apply to I2P. First, the use of DHT by Torsk and NISAN + is significantly different from that in I2P. Second, I2P's network database lookups are only + loosely correlated to the peer selection and + tunnel building processes; only previously-known peers + are used for tunnels. + Also, peer selection is unrelated to any notion of DHT key-closeness. +
++ Some of this may actually be more interesting when the I2P network gets much larger. + Right now, each router knows a large proportion of the network, so looking up a particular + Router Info in the network database is not strongly indicative of a future intent to use + that router in a tunnel. Perhaps when the network is 100 times larger, the lookup may be + more correlative. Of course, a larger network makes a Sybil attack that much harder. +
++ However, the general issue of DHT information leakage in I2P needs further investigation. + The floodfill routers are in a position to observe queries and gather information. + Certainly, at a level of f = 0.2 (20% malicious nodes, as specifed in the paper) + we expect that many of the Sybil threats we describe + (here, + here and + here) + become problematic for several reasons. +
+diff --git a/www.i2p2/pages/how_threatmodel.html b/www.i2p2/pages/how_threatmodel.html index cefbb3d2..47311b51 100644 --- a/www.i2p2/pages/how_threatmodel.html +++ b/www.i2p2/pages/how_threatmodel.html @@ -2,7 +2,7 @@ {% block title %}I2P's Threat Model{% endblock %} {% block content %} -Updated August 2010, current as of router version 0.8 +Updated November 2010, current as of router version 0.8.1
Your level of anonymity can be described as "how hard it is for someone @@ -105,6 +105,7 @@ to review.
+ (Reference: + In Search of an Anonymouns and Secure Lookup Section 5.2) +
++By refusing to accept or forward tunnel build requests, except to a colluding peer, a router could ensure +that a tunnel is formed wholly from its set of colluding routers. +The chances of success are enhanced if there is a large number of colluding routers, +i.e. a Sybil attack. +This is somewhat mitigated by our +peer profiling methods used to monitor the performance +of peers. +However, this is a powerful attack as the number of routers approaches +f = 0.2, or 20% malicious nodes, as specifed in the paper. +The malicous routers could also maintain connections to the target router and provide +excellent forwarding bandwidth for traffic over those connections, in an attempt +to manipulate the profiles managed by the target and appear attractive. +Further research and defenses may be necessary. +
+