[Freedombox-discuss] Santiago Updates
James Vasile
vasile at freedomboxfoundation.org
Mon Mar 5 02:50:10 UTC 2012
On Sun, 04 Mar 2012 20:06:26 -0600, "Nick M. Daly" <nick.m.daly at gmail.com> wrote:
> On Sun, 04 Mar 2012 19:56:43 -0500, James Vasile <vasile at freedomboxfoundation.org> wrote:
> > > - Consider changing message contents. Do we include meta-information in
> > > the replies to reduce the number of sent messages overall? Is sending
> > > data that can identify a single Santiago port to the recipient a
> > > greater risk than sending out many more messages per request, while
> > > keeping the responder hidden?
> >
> > Data that can ID the owner of a santiago port should be withheld until
> > the client hitting the port has authenticated and is allowed to know the
> > ID. We need an ACL system for that.
>
> When B is replying to a Santiago request, A has no idea that B is doing
> so. So, A might send a request message to several of B's Santiagi,
> before it gets a response. In turn, B might end up sending multiple
> response messages back to A if A's original Santiagi aren't accessible.
> A then needs to send B back and acknowledgment message to B to tell it
> to stop sending accept messages.
OK, I see what you mean. You're right.
[snip]
> I'm going to go ahead and say that allowing each message to contain a
> "reply to" header seems like a win, because it prioritizes known
> connections. It doesn't *seem* like an attacker (A) gets a lot from
> knowing that B's third Santiago was the reachable one. That'll take
> some additional thought though.
Agreed.
>
> A lot of it depends on where your Santiagi are reachable. Advertising a
> Santiago on a bare IP address is probably ill advised, but nonetheless
> not very useful to an outside attacker: only your friends will know what
> services you're willing to tell them about. There's no guarantee that
> the services you're advertising are running on your box anyway.
>
> > > - Store and load the data from FileDict objects correctly. James, I'll
> > > have to ask you about that, I'm getting weird threading errors that
> > > are probably due to building this outside of the main Plinth system.
> >
> > Let's confer on those. Are you using my withsqlite package for the file
> > dict?
>
> Probably not. I'll look at it more later this week. I tried to
> duplicate what you did with the users, but didn't mock it up very well,
> it seems.
Ok, shoot me a line when you're ready to dive in.
>
> > > - Build a non-HTTP protocol.
> >
> > This interests me. What do you have in mind here?
>
> Something that isn't HTTP? I just want to get rid of the blank 200s.
> That's a reply along the onion connection that it might be possible
> (desirable?) to get rid of. Granted, I don't think that matters much,
> so it might not be worth it for that reason alone. However, having
> multiple protocols could be useful if we want to use Santiago over SSH
> or something.
>
> > > I would prefer end-users stay away from it until the message queuing
> > > is worked out, but the worst that *should* happens is that the
> > > Santiago process (and the plug it's running on) are (D)DOSed, which
> > > will be inconvenient, but not harmful. Until the PGP encryption and
> > > signature verification are in, this may be very harmful.
> >
> > In thinking about FreedomBox, some of us have quietly assumed that if we
> > have to draw a line in the sand on vulnerability, DDoS is a good line.
> > At any point, if the worst that can happen is DDoS, that might be
> > acceptable.
>
> Yeah, flip through the readme. You'll be interested in the "Attacks" ->
> "Methods" -> "Flood" section.
Will do.
>
> Let me know what you think when you get time,
> Nick
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 489 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/freedombox-discuss/attachments/20120304/96ded0d9/attachment.pgp>
More information about the Freedombox-discuss
mailing list