[tahoe-lafs-trac-stream] [tahoe-lafs] #1426: re-key (write-enabler) protocol
tahoe-lafs
trac at tahoe-lafs.org
Tue Jul 12 08:38:25 PDT 2011
#1426: re-key (write-enabler) protocol
------------------------------+-----------------------
Reporter: warner | Owner:
Type: enhancement | Status: new
Priority: major | Milestone: undecided
Component: code-mutable | Version: 1.8.2
Resolution: | Keywords:
Launchpad Bug: |
------------------------------+-----------------------
Comment (by davidsarah):
Replying to [comment:4 zooko]:
> I guess the question is how much is it worth to the attacker to deny the
user the ability to update this file.
But it isn't doing that, it's only forcing the user to perform another
signature and round-trip.
> ... the attacker could accomplish the same goal by preventing all of the
user's packets from reaching the servers, or by compromising the servers.
That would achieve a stronger denial of service.
Replying to [comment:3 davidsarah]:
> Replying to [comment:2 zooko]:
> > One good defense would be to include the one-way hash of the previous
write-enabler in the message.
>
> Oh, good idea.
>
> > As davidsarah mentioned in comment:1, it might be convenient anyway
for the server to send this one-way hash of the current write-enabler to
the client, in order to inform the client about whether they need to
rekey.
>
> Yes, I now think we should do this.
Wait; for the above defence, the client would need to know the hash of the
''previous'' write-enabler in order to calculate the current one. So the
server would have to store the previous hash and send both hashes. This is
getting a bit complicated -- is it really important to prevent this
attack?
--
Ticket URL: <http://tahoe-lafs.org/trac/tahoe-lafs/ticket/1426#comment:5>
tahoe-lafs <http://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list