On Fri, Dec 17, 2010 at 04:03:06PM +0100,
 Loic Dachary <l...@dachary.org> wrote 
 a message of 100 lines which said:

> A user finds the answer to question Q by sending a request to the
> DHT node responsible for Q (the question Q is hashed into a DHT
> key). A malicious node may try to impersonate the node responsible
> for Q and return an answer that is irrelevant.

Why does it need to impersonate? It can simply join the DHT and then
be authoritative for a subset of the keys and reply what it
wants. That's the biggest problem with open DHTs (closed, one-shop
DHT, like those used at Google, Skype or Facebook are a different
matter).
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to