On Tue, Aug 26, 2008 at 4:48 PM, Tien Tuan Anh Dinh
<[EMAIL PROTECTED]>wrote:

>
>
> > My first results show a great improvement of the Sybil Attack defence,
> > even if eclipse attacks remain  possible.
>
> Would be great if you give us a link for that.
>
>
> > I think that this kind of "common-sense" protection is the minimum that
> > every P2P network should have, unless being totally unaware of the Sybil
> > Attack problem... Before these very last versions, KAD was really
> > unprotected and very easily and badly hurt with a Sybil Attack (see the
> > very good paper from Steiner: Exploiting KAD: possible uses and misuses
> > http://ccr.sigcomm.org/online/files/p65-steiner.pdf ).
>
> It's true, and this kind of *protection* work to a certain extends. But:
>
> 1. People seem to forget that IP addressed can be forged.


That's why aMule/eMule use three-way handshake. you can forge IP request,
but you hardly forge IP reply if the receiver send challenge to the forged
IP (except you can monitor the victim's whole traffic)

>
>
> 2. Multiple IDs are often related to Sybil attack, which I think the
> term *attack* is being abused. Sometimes, having multiple identities
> help balance the load in the system, e.g. Virtual Servers used in Chord'
> s File System (if it still exists). Or someone just happen to be running
> several *innocent* instances of the client in multiple Virtual Machines.
> Those should not be called *attacks*.

But the aMule/eMule's rule to limit Multiple ID's joining can deal with
Sybli attack, right?

>
>
> 3. For me, Sybils is an effective mechanism to amplify an attack, but
> ones often pays less attention to define what that attack is, and
> whether there is a way detect and mitigate that attack first. In theory,
> there could be an attack so well-thought that it may damage the system
> just by using one peer.


Maybe it's hard to attack the aMule/eMule by now just using one peer.

>
>
> Anh.
>

-Yunzhao

>
>
>
>
>
>
>
>
>
> _______________________________________________
> p2p-hackers mailing list
> [email protected]
> http://lists.zooko.com/mailman/listinfo/p2p-hackers
>
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to