[tahoe-lafs-trac-stream] [Tahoe-LAFS] #1010: anonymous client mode

Tahoe-LAFS trac at tahoe-lafs.org
Tue Sep 15 20:39:39 UTC 2015


#1010: anonymous client mode
-------------------------+-------------------------------------------------
     Reporter:  duck     |      Owner:  warner
         Type:           |     Status:  new
  enhancement            |  Milestone:  soon
     Priority:  minor    |    Version:  1.6.1
    Component:  code-    |   Keywords:  privacy anonymity docs anti-
  network                |  censorship forward-compatibility i2p-collab i2p
   Resolution:           |  tor-protocol
Launchpad Bug:           |
-------------------------+-------------------------------------------------

Comment (by str4d):

 For more terminology discussion, see
 [https://twitter.com/zooko/status/643863836756475909 this tweet by Zooko],
 and [https://twitter.com/zooko/status/643864107758800897 this one], and
 their replies.

 IMHO random Accounting client-ids are not necessary. From the I2P
 perspective, a Tahoe client is going to have a visible known I2P
 Destination at least for the duration of the process (by default client
 sessions are transient), and so an Accounting client-id that persists as
 long as the I2P Destination does is within the existing threat model. For
 a Tahoe client that is also a server, this will be long-term; for client-
 only nodes, this will be until restart (unless code was added to
 intentionally cycle Destinations on a shorter timescale). The Tor side
 will have similar considerations. I don't see a use case that requires a
 Tahoe client's I2P activity and Tor activity to be unlinked.

 Another consideration raised by this: we need to ensure that if the Tahoe
 configuration is changed, all identifiers are cycled (as best as
 possible). That means, if a user is running a "non-anonymous" client, and
 subsequently configures it to be "anonymous", then Tahoe needs to
 regenerate:

 * The I2P Destination
 * The Tor HS key
 * The Accounting client-id(s)

 The shares being accessed is a harder identifier to prevent leaking
 across, and I'm not sure how it could be done within the Tahoe-LAFS
 operational model. For comparison: the !BitTorrent client Vuze has an I2P
 plugin, and internally it runs two I2P Destinations - one for "pure" I2P
 traffic, and one for "mixed" I2P traffic (for any torrents being seeded
 simultaneously to/from I2P and the clearnet). It explicitly warns the user
 that once a torrent has been added with a given privacy setting, it should
 not be changed, because the already-fetched-blocks are a unique
 fingerprint for incomplete torrents. To change, they recommend deleting
 and re-adding the torrent. It's not something they can defend against, but
 they try to at least give the user plenty of warning.

--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1010#comment:55>
Tahoe-LAFS <https://Tahoe-LAFS.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list