-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 15/05/12 04:10, Russ Weeks wrote:
> 
> On Mon, May 14, 2012 at 4:25 PM, Tony Arcieri
> <tony.arci...@gmail.com> wrote: I haven't looked into how
> BitTorrent's DHT manages node IDs, so excuse me for
> lazy-ask-the-listing, but isn't a simple solution to this problem
> to cryptographically derive node IDs in such a way that makes it
> difficult to select for a particular ID?
> 
> 
> This was what I assumed, too.  Although, maybe Pirate Pay's "core
> IP" is to throw enough CPU cycles at the node ID hash computation
> so as to get a "closer" node ID than anybody else in the DHT.

It doesn't seem like that would be very difficult. If there's some
proof-of-work step that makes it hard to generate an ID, that step has
to be easy enough for an ordinary user's device to perform when the
user first install the app. Let's say the proof-of-work takes a minute
of CPU time - then an attacker with the same hardware as an ordinary
user can generate 1440 IDs per day, displacing 1440 peers from the
buckets for some random DHT keys. If the attacker's only interested in
one key, 1440 random IDs might not be very useful, but if the DHT is
full of content the attacker's interested in, all those node IDs can
be kept around until they come in useful.

Cheers,
Michael
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iQEcBAEBAgAGBQJPsf5aAAoJEBEET9GfxSfMzAEH/Rgt5rLz9pVwqBSlfEJRaFHP
n3IgLL1M4M224YB4VxrJyJ7eabJnpzyb4TnG9oKLlD7fzesw0ID4YBIyVEmpTF/C
E/wiWHpqOmENWAbSFKy6XxQmYMiLK0Qap4z+RSuC6XhTm1cmoctPRqOtiKOKeXfP
23HRPRvL4dvb5A94TvUknr6cwhcJWNGHcxltPs9X5GW5FIALgnrRYws9kXABwV/R
GBn/qLXzqD8939iM6XNnuaiH5o9SkNE+fMSUXAVbtjecxA6LJ/VcywkuOTPe8ftw
ZnWP5DaY1RIsfOZX4/abJ+u0NBWktg/TlDKDoNLxkIj6gwmWQWtkZ8Oh13k8saA=
=z9rt
-----END PGP SIGNATURE-----
_______________________________________________
p2p-hackers mailing list
p2p-hackers@lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to