Alexandre Dulaunoy wrote:
> On Wed, Dec 15, 2010 at 1:09 PM, Loic Dachary <l...@dachary.org> wrote:
>   
>> Hi,
>>
>> I would like to assert the security issues associated with the
>> deployment of a DHT open to the general public. I started to read "A
>> Survey of DHT Security Techniques" found at
>> http://www.globule.org/publi/SDST_acmcs2009.pdf and written by GUIDO
>> URDANETA, GUILLAUME PIERRE and MAARTEN VAN STEEN.
>>     
>
> Hi Loïc,
>
> For an overall overview of some DHT techniques, there
> is the following book:
>
> P2P Networking and Applications (Morgan Kaufmann Series in Networking)
> by John Buford
> ( http://www.librarything.com/work/8357901/book/45781374 )
>
> There are some other references in my public bookmarks:
>
> http://www.delicious.com/adulau/dht
>
>   
Hi,

Thanks for sharing :-)
> Regarding DHT security, there is the frequently cited paper from Emil Sit and
> Robert T. Morris:
>
> Security Considerations for Peer-to-Peer Distributed Hash Tables
>
> There is also a large academic literature regarding security and routing in 
> DHT.
>
> Hope this helps,
>   
It does. Together with Ludovic Courtès link to the GNUnet presentation
which describes a technique to cope with malicious nodes I'm starting to
see where the issues are.

The context in which I am exploring this topic is a collaborative search
software ( http://seeks-project.info/ ). I initialy thought I could try
to understand the DHT security without consideration to the context in
which it is used. However, what I've read so far leads me to think that
the strategies deployed to cope with security threats highly depends on
the usage. There does not seem to be universal best practices that
addresses all issues.

Do you think my impression correct ?

Cheers

<<attachment: loic.vcf>>

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to