Loic Dachary a écrit :
> Raphael Manfredi wrote:
>   
>> For reference purposes, the article I cited before:
>>
>>      "Efficient DHT attack mitigation through peers' ID distribution"
>>      Thibault Cholez et al.
>>      INRIA, Jun 2010, 8th.
>>
>> is available at:
>>
>> http://hal.inria.fr/docs/00/49/05/09/PDF/HotP2P10-KAD_DHT_attack_mitigation-cholez.pdf
>>   
>>     
> Hi,
>
> Thanks for sharing this document. Is there a reference implementation
> matching the paper ?
>
> Cheers
>
>   
> _______________________________________________
> p2p-hackers mailing list
> p2p-hackers@lists.zooko.com
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>   

Hello Ludovic,

We have done an implementation for KAD which still needs to be reviewed before 
being diffused (I hope it will in few weeks :)). However, the implementation 
done by Raphael in gtk-gnutella really sticks to the paper and can also be 
considered as a reference implementation.

Raphael made a great summary of the paper in his previous post, I don't have 
much to add. The good points are that the protection does not introduce any 
overhead in the P2P network (at least for kademlia-based DHTs) and keeps the 
compatibility between clients which was an important design requirement in 
order to "fix" actually deployed DHTs rather than building new "secure" ones 
from scratch.

Even then, as Raphael said, the state of the art regarding solutions against 
Sybil attacks is a bit disappointing when you don't want to introduce strong 
constraints or complex mechanisms (central / distributed certification, social 
networks, trust management...) to mitigate SA.


Regards,

Thibault






_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to