At Wed, 02 Jul 2008 09:48:27 +0800,
jiangxingfeng 36340 wrote:
> 
> Hi,all:
> 
> The authors of RELOAD-4 have done a great work to address security
> issues in P2P system. But I don't think it addresses all security
> issues. Especially the malicious behaviors of authenticated peer are
> not well dealt with, for example, misroute the packet, discard the
> packet silently,etc.

Well, we certainly never claimed to address all security issues,
so I'm not going to disagree with that. 

That said, I don't really expect a basic p2p protocol to do much
to address this sort of low-grade packet mismanagement attack. 
As far as I know, the only techniques for dealing with misbehavior of
on-path (from the perspective of the DHT) attack are fairly inefficient.
In any case, I would expect them to be DHT-dependent and therefore
isolated to the topology plugin (e.g., Maelstrom).

Is there some specific technical feature you believe should be in
RELOAD?

-Ekr

_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to