> At Wed, 02 Jul 2008 09:48:27 +0800,
> jiangxingfeng 36340 wrote:
> > 
> > Hi,all:
> > 
> > The authors of RELOAD-4 have done a great work to address security
> > issues in P2P system. But I don't think it addresses all security
> > issues. Especially the malicious behaviors of authenticated peer are
> > not well dealt with, for example, misroute the packet, discard the
> > packet silently,etc.
> 
> Well, we certainly never claimed to address all security issues,
> so I'm not going to disagree with that. 
> 
> That said, I don't really expect a basic p2p protocol to do much
> to address this sort of low-grade packet mismanagement attack. 

I don't think it is a low-grade issue because its negative impact on the 
routing. 

> As far as I know, the only techniques for dealing with misbehavior of
> on-path (from the perspective of the DHT) attack are fairly 
> inefficient.In any case, I would expect them to be DHT-dependent 
> and therefore
> isolated to the topology plugin (e.g., Maelstrom).
> Is there some specific technical feature you believe should be in
> RELOAD?

Although topology plugin can isolate specific mechanisms from the base 
protocol, the evovling security or other mechanisms have requirements for the 
protocol messages which should help the realization of the mechaisms. So that 
means at least RELOAD should support adding new messages or extending existing 
messages to achieve that.

Regards

JiangXingFeng


_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to