> At Wed, 02 Jul 2008 09:48:27 +0800, > jiangxingfeng 36340 wrote: > > > > Hi,all: > > > > The authors of RELOAD-4 have done a great work to address security > > issues in P2P system. But I don't think it addresses all security > > issues. Especially the malicious behaviors of authenticated peer are > > not well dealt with, for example, misroute the packet, discard the > > packet silently,etc. > > Well, we certainly never claimed to address all security issues, > so I'm not going to disagree with that. > > That said, I don't really expect a basic p2p protocol to do much > to address this sort of low-grade packet mismanagement attack.
I don't think it is a low-grade issue because its negative impact on the routing. > As far as I know, the only techniques for dealing with misbehavior of > on-path (from the perspective of the DHT) attack are fairly > inefficient.In any case, I would expect them to be DHT-dependent > and therefore > isolated to the topology plugin (e.g., Maelstrom). > Is there some specific technical feature you believe should be in > RELOAD? Although topology plugin can isolate specific mechanisms from the base protocol, the evovling security or other mechanisms have requirements for the protocol messages which should help the realization of the mechaisms. So that means at least RELOAD should support adding new messages or extending existing messages to achieve that. Regards JiangXingFeng _______________________________________________ P2PSIP mailing list [email protected] https://www.ietf.org/mailman/listinfo/p2psip
