Replies: 8 comments 11 replies
-
Let's use this page for discussing this topic. Please feel free to link to this and make mention of this in other places such as Reddit, Matrix, wherever else appropriate and to forward and consolidate comments from such into here. |
Beta Was this translation helpful? Give feedback.
-
Hi, It won't test crypto security, but just the code. But it could help |
Beta Was this translation helpful? Give feedback.
-
The things I would love to see audited is essentially your first thought, Reticulum, LXMF and how it implements the cryptography. I don't know if this is in the scope of what they do, but also potential flaws that could lead to a DoS attack would also be good to know, in case a well funded group or state tries to block the network. I think this would be a good avenue of investigation because while jamming may work on one specific frequency or even a range of frequencies, the nature of reticulum and how it is able to communicate over any medium would mean the attack of choice would be something against the network specifically and not the transport medium. |
Beta Was this translation helpful? Give feedback.
-
You’re gonna want to get @markqvist ’s and @faragher ’s opinion on this, but I think you’re absolutely right about auditing the whole cryptography/identity system at least. |
Beta Was this translation helpful? Give feedback.
-
Yes, as @LinuxinaBit says, the essential parts to get verified right now are the core workings of Reticulum itself, in order of priority:
In my personal opinion, those are the most relevant and valuable parts to get verified at this point. Once that is done, it would be interesting to start looking at higher-level protocols such as LXMF, but not before. |
Beta Was this translation helpful? Give feedback.
-
@markqvist Finally you are discussing the idea that I suggested many months ago... |
Beta Was this translation helpful? Give feedback.
-
I set up an lmxd instance... set it to announce.. then when it did announce I could see it in both MeshChat and NomadNet as clients, using a shared rnsd instance runng on the same machine. I then sent it messages... looking to play around with storing messages on the server and writing a program to come retrieve them later. All experimental stuff. Just trying to learn. in the .lxmd/storage/messages folder, a message got stored for each one I sent, in a separate file. All seems to be working just fine. Then I opened one of the messages in notepad on windows... and the body of the message was stored in cleartext... I was really hoping that the body of the message would have been encrypted in an lmxf message.. but maybe I have a lot more to learn. It may be that because the server itself is the destination of these test messages (which really is a bit of an unusual circumstance), the server just happens to have the required keys handy and decrypts the message. I can think of several ways that could be useful where you could send the server commands because it would decode the messages. Would it not be useful to be able to use the network to send the routers instructions? (powerful and dangerous too, perhaps.) To test end to end encryption, I would need to send the lxmd a message that is not "TO" the server itself. I'll work on that next, and see what the message looks like. |
Beta Was this translation helpful? Give feedback.
-
Hi @cannon-c, I visited the node you're hosting from the address in your Github profile and saw this: Could I ask what this entails, and what the logistics are you have planned for fundraising? I think it is very important to be as transparent as possible with any sort of fundraising effort as this requires a large degree of trust between the organizer and the community. There are far too many bad actors out there when it comes too crowdfunding (see https://blog.thecrowdfundingformula.com/crowdfunding-scams/ for examples) and unfortunately I just don't think this approach is something that can be done realistically. |
Beta Was this translation helpful? Give feedback.
-
I'm organizing a security audit of Reticulum+LXMF.
I am in contact with a company called Trail of Bits whom has expertise in conducting security audits of software, protocols, cryptography. Before proceeding, it would be good to understand what the community feels would have the biggest impact from a third-party security review.
If we had a third party review by an expert group such as Trail of Bits, what would be the most valuable thing they could help with?
Where would people in the community feel like Trail of Bits could help enhance security or make the development processes more secure and efficient?
Is it automated testing tools, formal verification, or something else that the community would find most useful?
Any other thoughts or suggestions?
My personal thoughts initially were to request:
After having this extra input and answers to these questions from others, Trail of Bits would be happy to setup a call with the broader community to discuss the security review considerations and get feedback.
Beta Was this translation helpful? Give feedback.
All reactions