Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
IT

Darknets Coming Soon? 288

Anonymous Stalwart writes "CIO.com is running a story on darknets and their implications for security. With the ruling against Grokster, darknets seem poised to become a reality. How this will impact the future of the workplace, from top-level IT/IS managers all the way to non-IT jobs will depend on how the tech community that is developing this technology treats it."
This discussion has been archived. No new comments can be posted.

Darknets Coming Soon?

Comments Filter:
  • Dark Ambition (Score:5, Informative)

    by Doc Ruby ( 173196 ) on Sunday November 13, 2005 @10:41AM (#14020025) Homepage Journal
    The "Grokster" ruling says that network operators can be liable for users illegal network abuse when operators promote abuse. It's a stupid ruling, but limited. And its standards for proving promotion are unfounded, really allowing just "appreciation" of abuse, without any evidence of public promotion. But operators which do not include even internal organizational acceptance of abuse, which promote only legal use, which offer even minimal protections of abuse, rather than any internal corporate policies which rely on the abuse, are not threatened. The sloppy evidential and jurisprudential standards in that landmark ruling will make it much more expensive for legit operators to remain safe, as they're sued willy-nilly by vengeful media corporations. But the mass media story that "P2P is now illegal" ought to get no promotion on geek sites like Slashdot. If you're going to run a darknet, why not just leave out the abuse promotion, and let your P2P flag fly?
  • by Anonymous Coward on Sunday November 13, 2005 @10:47AM (#14020047)
    What the heck is a darknet?

    I thought it was rather obvious from the article.
    some programmers have announced they would pursue so-called darknets. These private, invitation-only [p2p/file-sharing] networks can be invisible to even state-of-the-art sleuthing.
    - The Wolfkin
  • by Anonymous Coward on Sunday November 13, 2005 @10:49AM (#14020052)
    A Darknet is a private virtual network where users only connect to people they trust. Typically such networks are small, often with fewer than 10 users each. In its most general meaning, a Darknet can be any type closed, private group of people communicating, but the name is most often used specifically for file sharing networks.

    Source: http://en.wikipedia.org/wiki/Darknet [wikipedia.org]
  • by rholliday ( 754515 ) on Sunday November 13, 2005 @10:52AM (#14020067) Homepage Journal
    That was a short, almost pointless article. Basically amounted to "use standard security practices."

    I found this article [darknet.com] about "darknets" that I found informative, even though it's a book ad.
  • by Anonymous Coward on Sunday November 13, 2005 @10:53AM (#14020072)
    http://www.cio.com.nyud.net:8090/archive/110105/tl _filesharing.html [nyud.net]

    ---
    FILE SHARING
    Spies in the Server Closet
    BY MICHAEL JACKMAN

    The Supreme Court might have stirred up a bigger problem than it settled when it ruled last June that file-sharing networks such as Grokster could be sued if their members pirated copyrighted digital music and video.

    Since then, some programmers have announced they would pursue so-called darknets. These private, invitation-only networks can be invisible to even state-of-the-art sleuthing. And although they're attractive as a way to get around the entertainment industry's zeal in prosecuting digital piracy, they could also create a new channel for corporate espionage, says Eric Cole, chief scientist for Lockheed Martin Information Technology.

    Cole defines a darknet as a group of individuals who have a covert, dispersed communication channel. While file-sharing networks such as Grokster and even VPNs use public networks to exchange information, with a darknet, he says, "you don't know it's there in the first place."

    All an employee has to do to set one up is install file-sharing software written for darknets and invite someone on the outside to join, thus creating a private connection that's unlikely to be detected. "The Internet is so vast, porous and complex, it's easy to set up underground networks that are almost impossible to find and take down," says Cole.

    He advises that the best--and perhaps only--defense against darknets is a combination of network security best practices (such as firewalls, intrusion detection systems and intrusion prevention systems) and keeping intellectual property under lock and key. In addition, he says, companies should enact a security policy called "least privilege," which means users are given the least amount of access they need to do their jobs. "Usually if a darknet is set up it's because an individual has too much access," Cole says.

    ---
  • Re:Ok, real response (Score:5, Informative)

    by archeopterix ( 594938 ) * on Sunday November 13, 2005 @11:07AM (#14020116) Journal
    Besides, I think the idea of Darknets is flawed to begin with. It is taking current anonymous P2P networks (Freenet, Ants, I2P etc.) and tying both hands behind their back by no longer allowing all-to-all connections, but only connections to people you trust. That pretty much precludes any sensible routing and load balancing because people are selecting the available routes, and you can't create new connections. Say you are the only person with access to two different social groups, all info must flow over your connection creating a huge bottleneck that the software is not allowed to compensate for.
    This is true as the implication of "invite-only". There is, however, a middle ground between the current p2p mainstream and true darknets - encryption + origin hiding routing (onion or ants routing), but no invite-only. MUTE [sourceforge.net] is like this.
  • Re:Ok, real response (Score:1, Informative)

    by Anonymous Coward on Sunday November 13, 2005 @11:27AM (#14020184)
    Say you are the only person with access to two different social groups, all info must flow over your connection creating a huge bottleneck that the software is not allowed to compensate for.

    We found a way around that issue. Feel free to drop in and see for yourself: http://anonetnfo.brinkster.net/ [brinkster.net]
  • Two definitions (Score:3, Informative)

    by michaelmalak ( 91262 ) <michael@michaelmalak.com> on Sunday November 13, 2005 @11:39AM (#14020245) Homepage
    As usual, a Slashdot story summary haughtily uses new jargon without defining the term. So as usual, I go to Wikipedia to look it up. It seems there are two definitions [wikipedia.org].

    One definition is an encrypted protocol over the Internet. The other definition is using wireless technologies off the Internet. Oddly, the person quoted in the CIO article was trying to claim that encrypted, closed file sharing over the Internet was nothing like a VPN. That makes no sense to me, especially given the other definition of a darknet (the wireless one off the Internet) really is nothing like a VPN.

    A wireless-off-the-Internet darknet could serve Thomas Paine purposes if the U.S. government ever shuts down the Internet in response to a terrorist attack. An encrypted, closed information sharing network on the Internet could not.

  • Already there (Score:4, Informative)

    by m50d ( 797211 ) on Sunday November 13, 2005 @11:45AM (#14020272) Homepage Journal
    Gnunet [gnunet.org] is here and working. Fully usable as a P2P network, not as fast as unencrypted but close. I haven't tried using it in pure friend-to-friend mode but the functionality is there. And of course it has all the things you'd expect from an advanced P2P network, searches for automatically extracted keywords, signed namespaces where you can publish content anonymously but show that it's all from you, directories, etc.
  • Not Really (Score:5, Informative)

    by IBitOBear ( 410965 ) on Sunday November 13, 2005 @11:46AM (#14020282) Homepage Journal
    Actually, If you establish the DarkNet in the right way, once you are connected to a trusted node you could connect to any other node by passing authentication and encryption keys the long way. This would allow for dynamic (re)routing.

    Think of an IRC style web. Basically, a properly designed network would allow one party to inform another that it wanted to make a connection. Then it would make that connection. By pre-passing the keys and proof of identity, you would be able to make arbitrary connections within a "closed surface" of the net.

    ===

    What I have been waiting to see make a comeback is the good old fashioned POTS modem. With all the internet wire-tap laws being generally weaker than the phone tapping laws, it would _really_ make sense to transfer authentications (etc) through a old-fashioned BBS style "drop sites" that were not really on the net.

    So you downloaded some particular binary splash. To turn it into the song or whatever you would have to go get the key/completion-tidbit. Heck, the actual directores could be encoded so you _couldn't_ know what you were passing unless you were also in on the sideband/drop-site.
  • old news (Score:2, Informative)

    by Jerbol ( 660353 ) on Sunday November 13, 2005 @12:01PM (#14020343) Homepage
    there was a wired article [wired.com] on this very topic several months ago.
  • by @madeus ( 24818 ) <slashdot_24818@mac.com> on Sunday November 13, 2005 @01:37PM (#14020836)
    Try monitoring a campus network where you have several thousand users and an obscenely large amount of bandwidth. Oh, and you have live research data being generated on campus and moved to places like the NCSA etc... Bandwidth consumption may vary by tens of megabytes by the minute. So I ask you, in that situation (which I work in) what is an "increase in bandwidth" a sign of?

    Effective monitoring is actually quite achievable with freely avalible software.

    On a properly managed network you should be able to tell exactly who is using how much traffic and what type of traffic (and where it's coming in and out from) and to spot suspicious changes in usuage patterns, with historical data avalible in a format appropriate for a quick visual comparison. All of this should be fed in to your monitoring platform with alerts raised once set thresholds are reached.

    In practice though, it's usually not cost effective to actually clamp down on misuse of bandwith and it's more prudent to let it slide (and/or go for the low hanging fruit if spot anyone taking the mickey) and just pickup the tab afterwords.

    (Disclaimer: The next part of this post drifts away from this specific thread ;)

    I'm not sure why so many people imagine monitoring traffic by source and type is difficult and that they can't be spotted and rate limited on a per user basis, in an entirely automated fashion.

    Using tools like jflow and cflowd (and various other commerical purpose built tools) to do detailed traffic profiling, and to a limited extent shaping, is something a few carriers and large providers do already. Even if your provider doesn't do this, there is a really good chance their transit providers do it.

    At the moment, the majority of providers mark P2P traffic as the lowest priority for QoS purposes as it is, because (a) it's so all consuming and disproportionately resource intensive (compared to far more common tasks like legitimate HTTP traffic and FTP data transfer) and (b) it's hard to complain about slow transfer speeds of what is almost certainly Warez between you and an anonymous DSL/Cable subscriber in another state/country. This is partly why P2P transfer rates can be very crummy (the other major reason being of course the limited upstreams of most users).

    Once you have profiling data for a given port or IP on your network, all you need to do is send a trigger to the switch/router/DSLAM/etc. to either trottle the traffic for that port on the TCP/UDP ports required (as the hardware permits - ideally on a per-TCP/UPD-port basis), or - if your feeling adventurous (or your hardware is crummy) - dynamically re-route traffic for that destination seperately, though a series of systems that are capeable of enforcing very fine grained QoS controls (on appropriate hardware, the 2.6 kernel with iptables and some appropriate modules is actually capeable of impressive work in this area).

    If users start tunneling large amounts of traffic down other ports (and disguising it as as regular HTTP, SSH, HTTPS, etc. traffic) then it's going to be really obvious to spot using automated software, and those those users will find that providers will just impliment systems to nobble that specific type of traffic on their connection while they persist in doing that, and if they want unnobbled connection, they'll have to pay a real premium to compensate. It's also entirely possible providers will start enforcing QoS based on destination too, so that transfers to systems that are common P2P traffic destinations are effectively crippled (and traffic to network ranges used by Cable/DSL/College dorms/etc. could even be rated by default).

    If any users imagine they can 'sneak around' by tunneling P2P traffic and making it look like encrypted VoIP traffic (and warzing to their hearts content at the expense of the rest of legitimate users) they are in for a big shock. They are going to find that suddently their VoIP traffic starts having specific (weekly/monthly) transfer limi
  • by arevos ( 659374 ) on Sunday November 13, 2005 @01:44PM (#14020867) Homepage
    A pseudonoymous network system like MUTE or FreeNet would solve this by offering plausible deniability. You can't tell whether your neighbours are requesting illegal files, or whether they are merely unknowingly routing a request from someone else on the network.
  • Re:Not Really (Score:3, Informative)

    by Reziac ( 43301 ) * on Monday November 14, 2005 @02:23AM (#14024202) Homepage Journal
    For email from outside sources -- well, most halfway modern BBS software (defined as 1994 or later) can do internet email via UUCP, and the more recent incarnations use TCP/IP (and can do QWK/REP by regular email).

    Otherwise, and for maximum snoop-proofing against external forces, one has to be willing to make the phone call to transfer mail (both by users and BBS-to-BBS), which may involve a long distance call, and as with FIDO, often a considerable delay as packets hop from one BBS to the next. (As the old tagline goes -- "Internet: modem and phone lines. FidoNet: tin cans and string." :)

    There's no reason you can't encrypt your posts on the BBS, making them secure even from the sysop; in fact this used to be the norm on some BBSs, and I've seen one where it was *required*. You could either UUEncode the encrypted message and post it as ASCII, or attach an encrypted ZIP to an empty message, depending on the capabilities of the BBS software. To the BBS, it's just another message or attachment, it doesn't care that it's not in plain language. So the problem of snoop-proofing against the sysop is already solved (provided he allows encrypted messages. If he doesn't, he's probably not trustworthy anyway!)

    The concept of a "dumb router" may have merit, tho, to prevent any human from seeing where a given packet comes from or goes to. Of course, you can still get caught when you log in, but there again -- in the old days, some BBSs *required* that you use a unique alias and never post your real name. If you're really paranoid, use a pay phone (thus not a number traceable to you) and one of those gadgets that leech to the mouthpiece. (I've got one that does 28.8 -- they're still made, for laptop use in hotels that don't have phone jacks. Hopelessly slow for files, but adequate for QWK/REP packets.)

    There indeed was a problem with sysops losing interest or going off in a huff, but three that I've used had track records of 17 yrs, 10 yrs, and 11 yrs (and counting). So it's not a universal issue. Small ISPs go tits-up about as often as BBSs did.

    BTW I still use two BBSs daily -- one via telnet, the other as QWK/REP by email. And should both die... well, I already own Wildcat. :)

  • by FlippyTheSkillsaw ( 533983 ) on Monday November 14, 2005 @05:38AM (#14024602) Journal
    W.A.S.T.E. [sf.net]

You have a message from the operator.

Working...