This article needs additional citations for verification. (April 2019)
This article needs to be updated.(April 2019)
|Initial release||November 5, 2001|
0.14.1 / 4 April 2021
|Operating system||official: Free software operating systems (GNU/Linux, FreeBSD, NetBSD, OpenBSD);|
unofficial: Other operating systems (OS X, Windows)
|Available in||Spanish, English, Russian, German, French|
|Type||Anonymous P2P, Friend-to-friend|
|License||GNU AGPLv3 or later (Free software)|
|Part of a series on|
|Video sharing sites|
|File sharing networks|
|Anonymous file sharing|
|Development and societal aspects|
|By country or region|
GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP, HTTPS, WLAN and Bluetooth) and various basic peer-to-peer algorithms for routing, multicast and network size estimation.
GNUnet's basic network topology is that of a mesh network. GNUnet includes a distributed hash table (DHT) which is a randomized variant of Kademlia that can still efficiently route in small-world networks. GNUnet offers a "F2F topology" option for restricting connections to only the users' trusted friends. The users' friends' own friends (and so on) can then indirectly exchange files with the users' computer, never using its IP address directly.
GNUnet uses Uniform resource identifiers (not approved by IANA, although an application has been made).[when?] GNUnet URIs consist of two major parts: the module and the module specific identifier. A GNUnet URI is of form
gnunet://module/identifier where module is the module name and identifier is a module specific string.
The primary codebase is written in C, but there are bindings in other languages to produce an API for developing extensions in those languages. GNUnet is part of the GNU Project. It has gained interest in the hacker community after the PRISM revelations.
GNUnet consists of several subsystems, of which essential ones are Transport and Core subsystems. Transport subsystem provides insecure link-layer communications, while Core provides peer discovery and encryption. On top of the core subsystem various applications are built.
GNUnet includes various P2P applications in the main distribution of the framework, including filesharing, chat and VPN; additionally, a few external projects (such as secushare) are also extending the GNUnet infrastructure.
GNUnet network has no trusted entities so it is impossible to maintain global reputation. Instead, each peer maintains its own trust for each of its local links.
When resources, such as bandwidth and CPU time, are in excess, peer provides them to all requesting neighbors without reducing trust or otherwise charging them. When a node is under stress it drops requests from its neighbor nodes having lower internal trust value. However, when peer has less resources than enough to fulfill everyone's requests, it denies requests of those neighbors that it trusts less and charges others by reducing their trust.
The primary application at this point is anonymous, censorship-resistant file-sharing, allowing users to anonymously publish or retrieve information of all kinds. The GNUnet protocol which provides anonymity is called GAP (GNUnet anonymity protocol). GNUnet FS can additionally make use of GNU libextractor to automatically annotate shared files with metadata.
Files shared with GNUnet are ECRS (An Encoding for Censorship-Resistant Sharing) coded.
All content is represented as GBlocks. Each GBlock contains 1024 bytes. There are several types of GBlocks, each of them serves a particular purpose. Any GBlock is uniquely identified by its RIPEMD-160 hash .
DBlocks store actual file contents and nothing else. File is split at 1024 byte boundaries and resulting chunks are stored in DBlocks. DBlocks are linked together into Merkle tree by means of IBlocks that store DBlock identifiers.
Blocks are encrypted with a symmetric key derived from when they are stored in the network.
Queries and replies
GNUnet Anonymity Protocol consists of queries and replies. Depending on load of the forwarding node, messages are forwarded to zero or more nodes.
Queries are used to search for content and request data blocks.
Query contains resource identifier, reply address, priority and TTL (Time-to-Live).
Resource identifier of datum is a triple-hash . Peer that replies to query provides to prove that it indeed has the requested resource without providing to intermediate nodes, so intermediate nodes can't decrypt .
Reply address is the major difference compared to Freenet protocol. While in Freenet reply always propagates back using the same path as the query, in GNUnet the path may be shorter. Peer receiving a query may drop it, forward it without rewriting reply address or indirect it by replacing reply address with its own address. By indirecting queries peer provides cover traffic for its own queries, while by forwarding them peer avoids being a link in reply propagation and preserves its bandwidth. This feature allows the user to trade anonymity for efficiency. User can specify an anonymity level for each publish, search and download operation. An anonymity level of zero can be used to select non-anonymous file-sharing. GNUnet's DHT infrastructure is only used if non-anonymous file-sharing is specified. The anonymity level determines how much cover traffic a peer must have to hide the user's own actions.
Priority specifies how much of its trust user wants to spend in case of resource shortage.
TTL is used to prevent queries from staying in the network for too long.
File sharing URIs
- chk identifies files, typically:
gnunet://fs/chk/[file hash].[query hash].[file size in bytes]
- File hash is the hash of the plaintext file, which allows decrypting it once it is downloaded. Query hash is the hash of topmost GBlock which allows downloading the whole tree of GBlocks that contain encrypted file. File size is required to determine the shape of the tree.
- sks identifies files within namespaces, typically:
- ksk identifies search queries, typically:
- loc identifies a datum on a specific machine, typically:
A type of GNUnet filesharing URI pointing to a specific copy of GNU GPL license text:
Another type of GNUnet filesharing URI, pointing to the search results of a search with keyword "gpl":
GNU Name System
GNUnet includes an implementation of the GNU Name System (GNS), a decentralized and censorship-resistant replacement for DNS. In GNS, each user manages their own zones and can delegate subdomains to zones managed by other users. Lookups of records defined by other users are performed using GNUnet's DHT.
GNUnet can tunnel IP traffic over the peer-to-peer network. If necessary, GNUnet can perform IPv4-IPv6 protocol translation in the process. GNUnet provides a DNS Application-level gateway to proxy DNS requests and map addresses to the desired address family as necessary. This way, GNUnet offers a possible technology to facilitate IPv6 transition. Furthermore, in combination with GNS, GNUnet's protocol translation system can be used to access hidden services — IP-based services that run locally at some peer in the network and which can only be accessed by resolving a GNS name.
Gabor X Toth published in early September 2013 a thesis to present the design of a social messaging service for the GNUnet peer-to-peer framework that offers scalability, extensibility, and end-to-end encrypted communication. The scalability property is achieved through multicast message delivery, while extensibility is made possible by using PSYC (Protocol for SYnchronous Conferencing), which provides an extensible RPC (Remote Procedure Call) syntax that can evolve over time without having to upgrade the software on all nodes in the network. Another key feature provided by the PSYC layer are stateful multicast channels, which are used to store e.g. user profiles. End-to-end encrypted communication is provided by the mesh service of GNUnet, upon which the multicast channels are built. Pseudonymous users and social places in the system have cryptographical identities — identified by their public key — these are mapped to human memorable names using GNS (GNU Name System), where each pseudonym has a zone pointing to its places.
That is the required building block for turning the GNUnet framework into a fully peer-to-peer social networking platform.
A chat has been implemented in the CADET module, for which third-party GTK interface for GNOME exists, specifically designed for the emerging GNU/Linux phones (such as the Librem 5 or the PinePhone).
- GNUnet.org – About GNUnet e.V.
- "GNUnet 0.14.1 released"; author name string: Martin Schanzenbach; publication date: 4 April 2021; retrieved: 19 April 2021.
- GNUnet Source Code
- "license notice placed at the top in one of the source files of the project's repository, probably in each of its source files". Retrieved June 8, 2018.
GNUnet is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
- EvansPolotGrothoff 2012.
- Grothoff, Christian (2017-10-10). The GNUnet System (habilitation thesis). Université de Rennes 1.
- Grothoff 2013.
- FerreiraGrothoffRuth 2003, Figure 1.
- FerreiraGrothoffRuth 2003, II. GNUNET AND THE TRANSPORT LAYER: "The core is responsible for link-to-link encryption, binding of node identities to routable addresses, and peer discovery."
- "GNU Software". Software - GNU Project - Free Software Foundation. Free Software Foundation, Inc. Retrieved 25 January 2020.
- GrothoffPatrascuBennettStef 2002, 3.1.1 UDP.
- FerreiraGrothoffRuth 2003.
- Service Name and Transport Protocol Port Number Registry, p. 37
- Grothoff 2003.
- GrothoffPatrascuBennettStef 2002, 2.4 Mojo Nation.
- BennettGrothoff 2003.
- BennettGrothoffHorozovPatrascu 2002.
- GrothoffPatrascuBennettStef 2002, 5.5 More on queries.
- Grothoff, Christian. "File-Sharing URIs". www.gnunet.org. Retrieved 15 July 2016.
- Wachs 2014. sfn error: no target: CITEREFWachs2014 (help)
- Toth, Gabor X (2013-09-05), Design of a Social Messaging System Using Stateful Multicast Archived 2014-02-22 at the Wayback Machine - Retrieved 2013-09-28
- GNUnet.org documentation (2019-11-14) Chatting with a (simple) client - Retrieved 2019-11-14
- cadet-gtk on GitLab
- GNUnet CADET for mobile Linux – Reddit
- Grothoff, Christian; Patrascu, Ioana; Bennett, Krista; Stef, Tiberiu; Horozov, Tzvetan (2002-06-13). The GNet whitepaper (PDF) (Technical report). Purdue University.
- Bennett, Krista; Grothoff, Christian; Horozov, Tzvetan; Patrascu, Ioana (2002-07-03). Batten, Lynn; Seberry, Jennifer (eds.). Efficient Sharing of Encrypted Data. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 107–120. CiteSeerX 10.1.1.19.9837. doi:10.1007/3-540-45450-0_8. ISBN 9783540438618.
- Ferreira, Ronaldo; Grothoff, Christian; Ruth, Paul (2003-05-01). "A transport layer abstraction for peer-to-peer networks" (PDF). CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings. IEEE. pp. 398–405. CiteSeerX 10.1.1.13.5086. doi:10.1109/CCGRID.2003.1199393. ISBN 978-0-7695-1919-7. S2CID 1928711.
- Grothoff, Dipl-Math Christian (2003-06-01). "Resource allocation in peer-to-peer networks". Wirtschaftsinformatik. 45 (3): 285–292. doi:10.1007/BF03254946. ISSN 0937-6429. S2CID 4479637.
- Wachs, Matthias; Schanzenbach, Martin; Grothoff, Christian (2014). "A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System" (PDF). 13th International Conference on Cryptology and Network Security (CANS 2014). Lecture Notes in Computer Science. 8813 (13): 127–142. doi:10.1007/978-3-319-12280-9_9. ISBN 978-3-319-12279-3.
- Bennett, Krista; Grothoff, Christian (2003-03-26). Dingledine, Roger (ed.). gap – Practical Anonymous Networking. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 141–160. CiteSeerX 10.1.1.125.9673. doi:10.1007/978-3-540-40956-4_10. ISBN 9783540206101.
- Evans, Nathan; Polot, Bartlomiej; Grothoff, Christian (2012-05-21). Bestak, Robert; Kencl, Lukas; Li, Li Erran; Widmer, Joerg; Yin, Hao (eds.). Efficient and Secure Decentralized Network Size Estimation. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 304–317. doi:10.1007/978-3-642-30045-5_23. ISBN 9783642300448.
- Grothoff, Christian (2013-08-01). "Video: You broke the Internet. We're making ourselves a GNU one". gnunet.org. Pirate Party Germany, Berlin. Retrieved 4 October 2013.
- Grothoff, Christian (2015). "The Architecture of the GNUnet: 45 Subsystems in 45 Minutes" (PDF). Retrieved 2016-07-14.