I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit 1eae189e authored by str4d's avatar str4d
Browse files

Estimated DREAD ratings for the other attack vectors (need review)

parent 2fa89c38
No related branches found
No related tags found
No related merge requests found
...@@ -199,7 +199,7 @@ and priority scores are calculated using the equations outlined ...@@ -199,7 +199,7 @@ and priority scores are calculated using the equations outlined
<h3 id="bruteforce">{% trans %}Brute force attacks{% endtrans %}</h3> <h3 id="bruteforce">{% trans %}Brute force attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 3) }} {{ DREAD_score(2, 1, 1, 1, 3) }}
<p>{% trans -%} <p>{% trans -%}
A brute force attack can be mounted by a global passive or active adversary, A brute force attack can be mounted by a global passive or active adversary,
...@@ -280,7 +280,7 @@ References: <a href="{{ pdf }}">Low-Resource Routing Attacks Against Anonymous S ...@@ -280,7 +280,7 @@ References: <a href="{{ pdf }}">Low-Resource Routing Attacks Against Anonymous S
<h3 id="intersection">{% trans %}Intersection attacks{% endtrans %}</h3> <h3 id="intersection">{% trans %}Intersection attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 2, 2, 3, 3) }}
<p>{% trans -%} <p>{% trans -%}
Intersection attacks against low latency systems are extremely powerful - Intersection attacks against low latency systems are extremely powerful -
...@@ -365,7 +365,7 @@ There are a whole slew of denial of service attacks available against I2P, ...@@ -365,7 +365,7 @@ There are a whole slew of denial of service attacks available against I2P,
each with different costs and consequences: each with different costs and consequences:
{%- endtrans %}</p> {%- endtrans %}</p>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 1, 2, 1, 3) }}
<p>{% trans -%} <p>{% trans -%}
<b>Greedy user attack:</b> This is simply <b>Greedy user attack:</b> This is simply
people trying to consume significantly more resources than they are people trying to consume significantly more resources than they are
...@@ -389,7 +389,7 @@ Maintain a strong community with blogs, forums, IRC, and other means of communic ...@@ -389,7 +389,7 @@ Maintain a strong community with blogs, forums, IRC, and other means of communic
</ul> </ul>
<div style="clear:both"></div> <div style="clear:both"></div>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(2, 1, 1, 2, 3) }}
<p>{% trans peerselection=site_url('docs/how/peer-selection') -%} <p>{% trans peerselection=site_url('docs/how/peer-selection') -%}
<b>Starvation attack:</b> A hostile user may attempt to harm the network by <b>Starvation attack:</b> A hostile user may attempt to harm the network by
creating a significant number of peers in the network who are not identified as creating a significant number of peers in the network who are not identified as
...@@ -409,7 +409,7 @@ significant efforts required in this area. ...@@ -409,7 +409,7 @@ significant efforts required in this area.
{%- endtrans %}</p> {%- endtrans %}</p>
<div style="clear:both"></div> <div style="clear:both"></div>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 2, 2, 2, 3) }}
<p>{% trans todo=site_url('get-involved/todo') -%} <p>{% trans todo=site_url('get-involved/todo') -%}
<b>Flooding attack:</b> A hostile user may attempt to flood the network, <b>Flooding attack:</b> A hostile user may attempt to flood the network,
a peer, a destination, or a tunnel. Network and peer flooding is possible, a peer, a destination, or a tunnel. Network and peer flooding is possible,
...@@ -441,7 +441,7 @@ bugs in the implementation. ...@@ -441,7 +441,7 @@ bugs in the implementation.
{%- endtrans %}</p> {%- endtrans %}</p>
<div style="clear:both"></div> <div style="clear:both"></div>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(2, 2, 3, 2, 3) }}
<p id="ffdos">{% trans peerselection=site_url('docs/how/peer-selection'), <p id="ffdos">{% trans peerselection=site_url('docs/how/peer-selection'),
netdb=site_url('docs/how/network-database') -%} netdb=site_url('docs/how/network-database') -%}
<b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by <b>Floodfill DOS attack:</b> A hostile user may attempt to harm the network by
...@@ -477,7 +477,7 @@ as the links are encrypted and messages signed. ...@@ -477,7 +477,7 @@ as the links are encrypted and messages signed.
<h3 id="partitioning">{% trans %}Partitioning attacks{% endtrans %}</h3> <h3 id="partitioning">{% trans %}Partitioning attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 1, 1, 1, 2) }}
<p>{% trans -%} <p>{% trans -%}
Partitioning attacks - finding ways to segregate (technically or analytically) Partitioning attacks - finding ways to segregate (technically or analytically)
...@@ -517,7 +517,7 @@ Also discussed on the <a href="{{ netdb }}#threat">network database page</a> (bo ...@@ -517,7 +517,7 @@ Also discussed on the <a href="{{ netdb }}#threat">network database page</a> (bo
<h3 id="predecessor">{% trans %}Predecessor attacks{% endtrans %}</h3> <h3 id="predecessor">{% trans %}Predecessor attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 1, 1, 1, 3) }}
<p>{% trans -%} <p>{% trans -%}
The predecessor attack is passively gathering statistics in an attempt to see The predecessor attack is passively gathering statistics in an attempt to see
...@@ -562,7 +562,7 @@ which is an update to the 2004 predecessor attack paper ...@@ -562,7 +562,7 @@ which is an update to the 2004 predecessor attack paper
<h3 id="harvesting">{% trans %}Harvesting attacks{% endtrans %}</h3> <h3 id="harvesting">{% trans %}Harvesting attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 1, 2, 2, 3) }}
<p>{% trans -%} <p>{% trans -%}
"Harvesting" means compiling a list of users running I2P. "Harvesting" means compiling a list of users running I2P.
...@@ -609,7 +609,7 @@ enact other restricted route methods. ...@@ -609,7 +609,7 @@ enact other restricted route methods.
<h3 id="traffic">{% trans %}Identification Through Traffic Analysis{% endtrans %}</h3> <h3 id="traffic">{% trans %}Identification Through Traffic Analysis{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 1, 2, 3, 3) }}
<p>{% trans transport=site_url('docs/transport') -%} <p>{% trans transport=site_url('docs/transport') -%}
By inspecting the traffic into and out of a router, a malicious ISP By inspecting the traffic into and out of a router, a malicious ISP
...@@ -669,7 +669,7 @@ Reference: <a href="{{ pdf }}">Breaking and Improving Protocol Obfuscation</a> ...@@ -669,7 +669,7 @@ Reference: <a href="{{ pdf }}">Breaking and Improving Protocol Obfuscation</a>
<h3 id="sybil">{% trans %}Sybil attacks{% endtrans %}</h3> <h3 id="sybil">{% trans %}Sybil attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 2, 1, 3, 3) }}
<p>{% trans -%} <p>{% trans -%}
Sybil describes a category of attacks where the adversary creates arbitrarily Sybil describes a category of attacks where the adversary creates arbitrarily
...@@ -718,7 +718,7 @@ for more Sybil discussion. ...@@ -718,7 +718,7 @@ for more Sybil discussion.
<h3 id="buddy">{% trans %}Buddy Exhaustion attacks{% endtrans %}</h3> <h3 id="buddy">{% trans %}Buddy Exhaustion attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 2, 2, 1, 3) }}
<p>{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%} <p>{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%}
(Reference: <a href="{{ pdf }}">In Search of an Anonymouns and Secure Lookup</a> Section 5.2) (Reference: <a href="{{ pdf }}">In Search of an Anonymouns and Secure Lookup</a> Section 5.2)
...@@ -743,7 +743,7 @@ Further research and defenses may be necessary. ...@@ -743,7 +743,7 @@ Further research and defenses may be necessary.
<h3 id="crypto">{% trans %}Cryptographic attacks{% endtrans %}</h3> <h3 id="crypto">{% trans %}Cryptographic attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 2, 1, 3, 1) }}
<p>{% trans cryptography=site_url('docs/how/cryptography') -%} <p>{% trans cryptography=site_url('docs/how/cryptography') -%}
We use strong cryptography with long keys, and We use strong cryptography with long keys, and
...@@ -785,7 +785,7 @@ end to end messages include simple random padding. ...@@ -785,7 +785,7 @@ end to end messages include simple random padding.
<h3 id="floodfill">{% trans %}Floodfill Anonymity attacks{% endtrans %}</h3> <h3 id="floodfill">{% trans %}Floodfill Anonymity attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(3, 2, 1, 2, 2) }}
<p>{% trans netdb=site_url('docs/how/network-database') -%} <p>{% trans netdb=site_url('docs/how/network-database') -%}
In addition to the floodfill DOS attacks described In addition to the floodfill DOS attacks described
...@@ -815,7 +815,7 @@ Several scenarios are discussed on the ...@@ -815,7 +815,7 @@ Several scenarios are discussed on the
<h3 id="central">{% trans %}Central Resource Attacks{% endtrans %}</h3> <h3 id="central">{% trans %}Central Resource Attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(1, 1, 1, 3, 3) }}
<p>{% trans -%} <p>{% trans -%}
There are a few centralized or limited resources (some inside I2P, some not) There are a few centralized or limited resources (some inside I2P, some not)
...@@ -870,7 +870,7 @@ and would shrink the network (in the short-to-medium term), just as the loss of ...@@ -870,7 +870,7 @@ and would shrink the network (in the short-to-medium term), just as the loss of
<h3 id="dev">{% trans %}Development attacks{% endtrans %}</h3> <h3 id="dev">{% trans %}Development attacks{% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(2, 1, 1, 3, 1) }}
<p>{% trans -%} <p>{% trans -%}
These attacks aren't directly on the network, but instead go after its development team These attacks aren't directly on the network, but instead go after its development team
...@@ -911,7 +911,7 @@ should any defense be necessary. ...@@ -911,7 +911,7 @@ should any defense be necessary.
<h3 id="impl">{% trans %}Implementation attacks (bugs){% endtrans %}</h3> <h3 id="impl">{% trans %}Implementation attacks (bugs){% endtrans %}</h3>
{{ DREAD_score(1, 1, 1, 1, 1) }} {{ DREAD_score(2, 2, 1, 3, 1) }}
<p>{% trans -%} <p>{% trans -%}
Try as we might, most nontrivial applications include errors in the design or Try as we might, most nontrivial applications include errors in the design or
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment