Hi guys,

Thanks Eugen and Greg for mailing me about this.

The answer to ID clustering attacks is that cjdns is just really lazy,
it routes to the physically nearest node whose ip address is numerically
closer to the destination than your own (based on KAD).
Since the physical topology is friend-to-friend, the attacker is forced
to have a relatively tight cluster of nodes in physical space, they can
pollute their own neighborhood but not the whole network. Pollution of
one physical neighborhood would likely lead to them being de-peered by
their "friend" who gave them the link.

Re the recursive routing, it has two options. You can send direct to the
destination at the switch level or you can forward to any node in the
network and ask them to forward to the destination. The nodes between you
and the one you asked to forward will have no access to the IPv6 dest
address and if the one you are forwarding to us unfriendly, you use
someone else. We've considered changing this to improve scalability
but I can't figure out how to preserve this guarantee.

The most scary general attack on the idea is a node who drops 10% of the
packets sent through them. I don't know how to detect it statelessly and
they can do quite a bit of damage.
Again though the physical reality of the network comes in to play.
The nodes which carry the majority of the traffic are heavily peered core
nodes and the operators of such are unlikely to intentionally attack the
network, this is the same logic which holds BGP together despite it's
painful frailty.


Hope that helps

Thanks,
Caleb



On 07/14/2013 04:50 PM, Eugen Leitl wrote:
> ----- Forwarded message from Mitar <mmi...@gmail.com> -----
> 
> Date: Sun, 14 Jul 2013 05:55:37 -0700
> From: Mitar <mmi...@gmail.com>
> To: liberationtech <liberationtech@lists.stanford.edu>
> Subject: Re: [liberationtech] CJDNS hype
> Reply-To: liberationtech <liberationtech@lists.stanford.edu>
> 
> Hi!
> 
> On Sun, Jul 14, 2013 at 5:01 AM, Ralph Holz <h...@net.in.tum.de> wrote:
>> I don't see how "no need to make a decision" should be possible. If you
>> don't know any contacts in the network, how are you supposed to trust them?
> 
> Ideally, you shouldn't have to trust anybody. :-)
> 
> You should be able to turn on your overlay network node, it should
> connect to the network, and you should be able to communicate with
> anybody, despite somebody trying to censor you.
> 
> Sadly, it seems we are not yet there. Or maybe we will never be.
> 
>> First of all, they use recursive routing instead of iterative lookups
>> (that's important to deal with the attacker on the IP level). Then they
>> use a random walk to get around a tactically acting attacker trying to
>> occupy important spots in the network, before they switch to the normal
>> routing.
> 
> It seems CJDNS is using the recursive routing approach? But isn't so
> that it is enough that in the whole routing path you get only one
> adversary node and this node can black hole your packets?
> 
> 
> Mitar
> 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Reply via email to