forked from I2P_Developers/i2p.www
Hide DREAD ratings until we know how we want to use them
This commit is contained in:
@@ -157,6 +157,8 @@ The
|
|||||||
to review.
|
to review.
|
||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
|
|
||||||
|
{# Hide DREAD ratings until we know how we want to use them
|
||||||
|
|
||||||
<p>{% trans DREAD='https://blogs.msdn.com/b/david_leblanc/archive/2007/08/13/dreadful.aspx' -%}
|
<p>{% trans DREAD='https://blogs.msdn.com/b/david_leblanc/archive/2007/08/13/dreadful.aspx' -%}
|
||||||
Attacks are judged using the <a href="{{ DREAD }}">modified <strong>DREAD</strong> model</a>:
|
Attacks are judged using the <a href="{{ DREAD }}">modified <strong>DREAD</strong> model</a>:
|
||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
@@ -175,6 +177,8 @@ and priority scores are calculated using the equations outlined
|
|||||||
<a href="{{ DREAD }}">here</a>.
|
<a href="{{ DREAD }}">here</a>.
|
||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
|
|
||||||
|
#}
|
||||||
|
|
||||||
<h3 id="index">{% trans %}Index of Attacks{% endtrans %}</h3>
|
<h3 id="index">{% trans %}Index of Attacks{% endtrans %}</h3>
|
||||||
<ul>
|
<ul>
|
||||||
<li><a href="#bruteforce">{% trans %}Brute force attacks{% endtrans %}</a></li>
|
<li><a href="#bruteforce">{% trans %}Brute force attacks{% endtrans %}</a></li>
|
||||||
@@ -199,7 +203,7 @@ and priority scores are calculated using the equations outlined
|
|||||||
|
|
||||||
<h3 id="bruteforce">{% trans %}Brute force attacks{% endtrans %}</h3>
|
<h3 id="bruteforce">{% trans %}Brute force attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(2, 1, 1, 1, 3) }}
|
{# DREAD_score(2, 1, 1, 1, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
A brute force attack can be mounted by a global passive or active adversary,
|
A brute force attack can be mounted by a global passive or active adversary,
|
||||||
@@ -243,7 +247,7 @@ are discussed on the
|
|||||||
|
|
||||||
<h3 id="timing">{% trans %}Timing attacks{% endtrans %}</h3>
|
<h3 id="timing">{% trans %}Timing attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(2, 2, 2, 3, 2) }}
|
{# DREAD_score(2, 2, 2, 3, 2) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
I2P's messages are unidirectional and do not necessarily imply that a reply
|
I2P's messages are unidirectional and do not necessarily imply that a reply
|
||||||
@@ -280,7 +284,7 @@ References: <a href="{{ pdf }}">Low-Resource Routing Attacks Against Anonymous S
|
|||||||
|
|
||||||
<h3 id="intersection">{% trans %}Intersection attacks{% endtrans %}</h3>
|
<h3 id="intersection">{% trans %}Intersection attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 2, 2, 3, 3) }}
|
{# DREAD_score(3, 2, 2, 3, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
Intersection attacks against low latency systems are extremely powerful -
|
Intersection attacks against low latency systems are extremely powerful -
|
||||||
@@ -365,7 +369,7 @@ There are a whole slew of denial of service attacks available against I2P,
|
|||||||
each with different costs and consequences:
|
each with different costs and consequences:
|
||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 2, 1, 3) }}
|
{# DREAD_score(1, 1, 2, 1, 3) #}
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
<b>Greedy user attack:</b> This is simply
|
<b>Greedy user attack:</b> This is simply
|
||||||
people trying to consume significantly more resources than they are
|
people trying to consume significantly more resources than they are
|
||||||
@@ -389,7 +393,7 @@ Maintain a strong community with blogs, forums, IRC, and other means of communic
|
|||||||
</ul>
|
</ul>
|
||||||
<div style="clear:both"></div>
|
<div style="clear:both"></div>
|
||||||
|
|
||||||
{{ DREAD_score(2, 1, 1, 2, 3) }}
|
{# DREAD_score(2, 1, 1, 2, 3) #}
|
||||||
<p>{% trans peerselection=site_url('docs/how/peer-selection') -%}
|
<p>{% trans peerselection=site_url('docs/how/peer-selection') -%}
|
||||||
<b>Starvation attack:</b> A hostile user may attempt to harm the network by
|
<b>Starvation attack:</b> A hostile user may attempt to harm the network by
|
||||||
creating a significant number of peers in the network who are not identified as
|
creating a significant number of peers in the network who are not identified as
|
||||||
@@ -409,7 +413,7 @@ significant efforts required in this area.
|
|||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
<div style="clear:both"></div>
|
<div style="clear:both"></div>
|
||||||
|
|
||||||
{{ DREAD_score(1, 2, 2, 2, 3) }}
|
{# DREAD_score(1, 2, 2, 2, 3) #}
|
||||||
<p>{% trans todo=site_url('get-involved/todo') -%}
|
<p>{% trans todo=site_url('get-involved/todo') -%}
|
||||||
<b>Flooding attack:</b> A hostile user may attempt to flood the network,
|
<b>Flooding attack:</b> A hostile user may attempt to flood the network,
|
||||||
a peer, a destination, or a tunnel. Network and peer flooding is possible,
|
a peer, a destination, or a tunnel. Network and peer flooding is possible,
|
||||||
@@ -428,7 +432,7 @@ operation</a> is implemented).
|
|||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
<div style="clear:both"></div>
|
<div style="clear:both"></div>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 1, 1, 1) }}
|
{# DREAD_score(1, 1, 1, 1, 1) #}
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
<b>CPU load attack:</b> There are currently some methods for people to
|
<b>CPU load attack:</b> There are currently some methods for people to
|
||||||
remotely request that a peer perform some cryptographically expensive
|
remotely request that a peer perform some cryptographically expensive
|
||||||
@@ -441,7 +445,7 @@ bugs in the implementation.
|
|||||||
{%- endtrans %}</p>
|
{%- endtrans %}</p>
|
||||||
<div style="clear:both"></div>
|
<div style="clear:both"></div>
|
||||||
|
|
||||||
{{ DREAD_score(2, 2, 3, 2, 3) }}
|
{# DREAD_score(2, 2, 3, 2, 3) #}
|
||||||
<p id="ffdos">{% trans peerselection=site_url('docs/how/peer-selection'),
|
<p id="ffdos">{% trans peerselection=site_url('docs/how/peer-selection'),
|
||||||
netdb=site_url('docs/how/network-database') -%}
|
netdb=site_url('docs/how/network-database') -%}
|
||||||
<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by
|
<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by
|
||||||
@@ -459,7 +463,7 @@ For more information see the
|
|||||||
|
|
||||||
<h3 id="tagging">{% trans %}Tagging attacks{% endtrans %}</h3>
|
<h3 id="tagging">{% trans %}Tagging attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(1, 3, 1, 1, 1) }}
|
{# DREAD_score(1, 3, 1, 1, 1) #}
|
||||||
|
|
||||||
<p>{% trans todo=site_url('get-involved/todo') -%}
|
<p>{% trans todo=site_url('get-involved/todo') -%}
|
||||||
Tagging attacks - modifying a message so that it can later be identified
|
Tagging attacks - modifying a message so that it can later be identified
|
||||||
@@ -477,7 +481,7 @@ as the links are encrypted and messages signed.
|
|||||||
|
|
||||||
<h3 id="partitioning">{% trans %}Partitioning attacks{% endtrans %}</h3>
|
<h3 id="partitioning">{% trans %}Partitioning attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 1, 1, 1, 2) }}
|
{# DREAD_score(3, 1, 1, 1, 2) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
Partitioning attacks - finding ways to segregate (technically or analytically)
|
Partitioning attacks - finding ways to segregate (technically or analytically)
|
||||||
@@ -517,7 +521,7 @@ Also discussed on the <a href="{{ netdb }}#threat">network database page</a> (bo
|
|||||||
|
|
||||||
<h3 id="predecessor">{% trans %}Predecessor attacks{% endtrans %}</h3>
|
<h3 id="predecessor">{% trans %}Predecessor attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 1, 1, 3) }}
|
{# DREAD_score(1, 1, 1, 1, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
The predecessor attack is passively gathering statistics in an attempt to see
|
The predecessor attack is passively gathering statistics in an attempt to see
|
||||||
@@ -562,7 +566,7 @@ which is an update to the 2004 predecessor attack paper
|
|||||||
|
|
||||||
<h3 id="harvesting">{% trans %}Harvesting attacks{% endtrans %}</h3>
|
<h3 id="harvesting">{% trans %}Harvesting attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 2, 2, 3) }}
|
{# DREAD_score(1, 1, 2, 2, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
"Harvesting" means compiling a list of users running I2P.
|
"Harvesting" means compiling a list of users running I2P.
|
||||||
@@ -609,7 +613,7 @@ enact other restricted route methods.
|
|||||||
|
|
||||||
<h3 id="traffic">{% trans %}Identification Through Traffic Analysis{% endtrans %}</h3>
|
<h3 id="traffic">{% trans %}Identification Through Traffic Analysis{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 2, 3, 3) }}
|
{# DREAD_score(1, 1, 2, 3, 3) #}
|
||||||
|
|
||||||
<p>{% trans transport=site_url('docs/transport') -%}
|
<p>{% trans transport=site_url('docs/transport') -%}
|
||||||
By inspecting the traffic into and out of a router, a malicious ISP
|
By inspecting the traffic into and out of a router, a malicious ISP
|
||||||
@@ -669,7 +673,7 @@ Reference: <a href="{{ pdf }}">Breaking and Improving Protocol Obfuscation</a>
|
|||||||
|
|
||||||
<h3 id="sybil">{% trans %}Sybil attacks{% endtrans %}</h3>
|
<h3 id="sybil">{% trans %}Sybil attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 2, 1, 3, 3) }}
|
{# DREAD_score(3, 2, 1, 3, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
Sybil describes a category of attacks where the adversary creates arbitrarily
|
Sybil describes a category of attacks where the adversary creates arbitrarily
|
||||||
@@ -718,7 +722,7 @@ for more Sybil discussion.
|
|||||||
|
|
||||||
<h3 id="buddy">{% trans %}Buddy Exhaustion attacks{% endtrans %}</h3>
|
<h3 id="buddy">{% trans %}Buddy Exhaustion attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 2, 2, 1, 3) }}
|
{# DREAD_score(3, 2, 2, 1, 3) #}
|
||||||
|
|
||||||
<p>{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%}
|
<p>{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%}
|
||||||
(Reference: <a href="{{ pdf }}">In Search of an Anonymouns and Secure Lookup</a> Section 5.2)
|
(Reference: <a href="{{ pdf }}">In Search of an Anonymouns and Secure Lookup</a> Section 5.2)
|
||||||
@@ -743,7 +747,7 @@ Further research and defenses may be necessary.
|
|||||||
|
|
||||||
<h3 id="crypto">{% trans %}Cryptographic attacks{% endtrans %}</h3>
|
<h3 id="crypto">{% trans %}Cryptographic attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 2, 1, 3, 1) }}
|
{# DREAD_score(3, 2, 1, 3, 1) #}
|
||||||
|
|
||||||
<p>{% trans cryptography=site_url('docs/how/cryptography') -%}
|
<p>{% trans cryptography=site_url('docs/how/cryptography') -%}
|
||||||
We use strong cryptography with long keys, and
|
We use strong cryptography with long keys, and
|
||||||
@@ -785,7 +789,7 @@ end to end messages include simple random padding.
|
|||||||
|
|
||||||
<h3 id="floodfill">{% trans %}Floodfill Anonymity attacks{% endtrans %}</h3>
|
<h3 id="floodfill">{% trans %}Floodfill Anonymity attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(3, 2, 1, 2, 2) }}
|
{# DREAD_score(3, 2, 1, 2, 2) #}
|
||||||
|
|
||||||
<p>{% trans netdb=site_url('docs/how/network-database') -%}
|
<p>{% trans netdb=site_url('docs/how/network-database') -%}
|
||||||
In addition to the floodfill DOS attacks described
|
In addition to the floodfill DOS attacks described
|
||||||
@@ -815,7 +819,7 @@ Several scenarios are discussed on the
|
|||||||
|
|
||||||
<h3 id="central">{% trans %}Central Resource Attacks{% endtrans %}</h3>
|
<h3 id="central">{% trans %}Central Resource Attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(1, 1, 1, 3, 3) }}
|
{# DREAD_score(1, 1, 1, 3, 3) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
There are a few centralized or limited resources (some inside I2P, some not)
|
There are a few centralized or limited resources (some inside I2P, some not)
|
||||||
@@ -870,7 +874,7 @@ and would shrink the network (in the short-to-medium term), just as the loss of
|
|||||||
|
|
||||||
<h3 id="dev">{% trans %}Development attacks{% endtrans %}</h3>
|
<h3 id="dev">{% trans %}Development attacks{% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(2, 1, 1, 3, 1) }}
|
{# DREAD_score(2, 1, 1, 3, 1) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
These attacks aren't directly on the network, but instead go after its development team
|
These attacks aren't directly on the network, but instead go after its development team
|
||||||
@@ -911,7 +915,7 @@ should any defense be necessary.
|
|||||||
|
|
||||||
<h3 id="impl">{% trans %}Implementation attacks (bugs){% endtrans %}</h3>
|
<h3 id="impl">{% trans %}Implementation attacks (bugs){% endtrans %}</h3>
|
||||||
|
|
||||||
{{ DREAD_score(2, 2, 1, 3, 1) }}
|
{# DREAD_score(2, 2, 1, 3, 1) #}
|
||||||
|
|
||||||
<p>{% trans -%}
|
<p>{% trans -%}
|
||||||
Try as we might, most nontrivial applications include errors in the design or
|
Try as we might, most nontrivial applications include errors in the design or
|
||||||
|
Reference in New Issue
Block a user