At Wed, 02 Jul 2008 09:48:27 +0800, jiangxingfeng 36340 wrote: > > Hi,all: > > The authors of RELOAD-4 have done a great work to address security > issues in P2P system. But I don't think it addresses all security > issues. Especially the malicious behaviors of authenticated peer are > not well dealt with, for example, misroute the packet, discard the > packet silently,etc.
Well, we certainly never claimed to address all security issues, so I'm not going to disagree with that. That said, I don't really expect a basic p2p protocol to do much to address this sort of low-grade packet mismanagement attack. As far as I know, the only techniques for dealing with misbehavior of on-path (from the perspective of the DHT) attack are fairly inefficient. In any case, I would expect them to be DHT-dependent and therefore isolated to the topology plugin (e.g., Maelstrom). Is there some specific technical feature you believe should be in RELOAD? -Ekr _______________________________________________ P2PSIP mailing list [email protected] https://www.ietf.org/mailman/listinfo/p2psip
