[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [freehaven-dev] Tarzan meeting, Sunday 2:00pm: Agenda attached



Mike,

Just read your agenda.  I'll have a look and send comments tonight if I
have time...otherwise I'll look it over on Monday.

Nick

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Nick Feamster                                   feamster@mit.edu
Massachusetts Institute of Technology           http://www.mit.edu/~feamster/
440 Massachusetts Ave., Cambridge, MA 02139     (617) 491-3949 
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

On Sun, 11 Mar 2001 00:41:19 EST, Michael J Freedman wrote:

> Hey all,
> 
> Reminder, we have a meeting tomorrow to discuss the proposed Tarzan design.
>  Look back over the freehaven-dev archives to find a short description of it.
> 
> 	Sunday, 2:00pm
> 	MIT Room 2-255
> 
> See you tomorrow!
> --mike
> 
> 
> Agenda Items
> --------
> 
> There are primarily three stages to the Tarzan communications protocol.  
> 1. Alice and Bob connect to a meeting place.
> 2. Alice and Bob establish end-to-end communication path.
> 3. Alice and Bob communication over that path.
> 
> We're going to discuss these in depth tomorrow.
> 
> 
> 1. Review proposed session "setup" procedure
> 	- Alice and Bob connect to Meeting Place
> 
> 2. Discuss virtual circuit establishment after "setup" procedure.
>     	Problem:   Meeting place can read data flowing over it
>     	Solution?   Setup new keys?  How?  
> 
> 		Problem:
>  		Meeting place can read all non end-to-end 
> 		PK-encrypted msgs between Alice and Bob.
> 
> 		Alice does not necessary know PKs for hops
> 		used by Bob to connect to Meeting Place.
> 
> 		We need entity/key authentication -- something
> 		like DH key agreement or Shamir's no-key protocol
> 		not viable.
> 
> 		Possibility?  Require extra step for Alice to send Bob
> 		symmetric keys to use for Bob's hops, which Bob 
> 		back-propogrates.  This is, um, ugly.
> 
> 	Problem:  Meeting place gets loaded to heavily.
> 		DoS attack - meeting place can only handle one
> 		incoming connection to Bob at once? 
> 		TCP multiplexing would be complex!
> 	
> 	Alternative?  Alice and Bob connect through a new proxy
> 		How do they choose, is this protocol getting too
> 		complicated, etc.  
> 
> 
> 3. Data transmission over circuit
> 	-- message authentication desirable
> 	   (MACs on a data stream?)
>   	-- efficiency:  this is where we want to "win"
> 
> If extra time (ha!):
> 
> 4. Language war (what do we *really* want)
> 5. Discussion of key revocation/rotation?
> 6. Distributed key-value lookup service
> 
> 
> 
> -----
> "Not all those who wander are lost."                  mfreed@mit.edu
> 
> 
> 
> 
>