On Tue, Aug 26, 2008 at 4:48 PM, Tien Tuan Anh Dinh <[EMAIL PROTECTED]>wrote:
> > > > My first results show a great improvement of the Sybil Attack defence, > > even if eclipse attacks remain possible. > > Would be great if you give us a link for that. > > > > I think that this kind of "common-sense" protection is the minimum that > > every P2P network should have, unless being totally unaware of the Sybil > > Attack problem... Before these very last versions, KAD was really > > unprotected and very easily and badly hurt with a Sybil Attack (see the > > very good paper from Steiner: Exploiting KAD: possible uses and misuses > > http://ccr.sigcomm.org/online/files/p65-steiner.pdf ). > > It's true, and this kind of *protection* work to a certain extends. But: > > 1. People seem to forget that IP addressed can be forged. That's why aMule/eMule use three-way handshake. you can forge IP request, but you hardly forge IP reply if the receiver send challenge to the forged IP (except you can monitor the victim's whole traffic) > > > 2. Multiple IDs are often related to Sybil attack, which I think the > term *attack* is being abused. Sometimes, having multiple identities > help balance the load in the system, e.g. Virtual Servers used in Chord' > s File System (if it still exists). Or someone just happen to be running > several *innocent* instances of the client in multiple Virtual Machines. > Those should not be called *attacks*. But the aMule/eMule's rule to limit Multiple ID's joining can deal with Sybli attack, right? > > > 3. For me, Sybils is an effective mechanism to amplify an attack, but > ones often pays less attention to define what that attack is, and > whether there is a way detect and mitigate that attack first. In theory, > there could be an attack so well-thought that it may damage the system > just by using one peer. Maybe it's hard to attack the aMule/eMule by now just using one peer. > > > Anh. > -Yunzhao > > > > > > > > > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers >
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
