Alexandre Dulaunoy wrote: > On Wed, Dec 15, 2010 at 1:09 PM, Loic Dachary <l...@dachary.org> wrote: > >> Hi, >> >> I would like to assert the security issues associated with the >> deployment of a DHT open to the general public. I started to read "A >> Survey of DHT Security Techniques" found at >> http://www.globule.org/publi/SDST_acmcs2009.pdf and written by GUIDO >> URDANETA, GUILLAUME PIERRE and MAARTEN VAN STEEN. >> > > Hi Loïc, > > For an overall overview of some DHT techniques, there > is the following book: > > P2P Networking and Applications (Morgan Kaufmann Series in Networking) > by John Buford > ( http://www.librarything.com/work/8357901/book/45781374 ) > > There are some other references in my public bookmarks: > > http://www.delicious.com/adulau/dht > > Hi,
Thanks for sharing :-) > Regarding DHT security, there is the frequently cited paper from Emil Sit and > Robert T. Morris: > > Security Considerations for Peer-to-Peer Distributed Hash Tables > > There is also a large academic literature regarding security and routing in > DHT. > > Hope this helps, > It does. Together with Ludovic Courtès link to the GNUnet presentation which describes a technique to cope with malicious nodes I'm starting to see where the issues are. The context in which I am exploring this topic is a collaborative search software ( http://seeks-project.info/ ). I initialy thought I could try to understand the DHT security without consideration to the context in which it is used. However, what I've read so far leads me to think that the strategies deployed to cope with security threats highly depends on the usage. There does not seem to be universal best practices that addresses all issues. Do you think my impression correct ? Cheers
<<attachment: loic.vcf>>
signature.asc
Description: OpenPGP digital signature
_______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers