At Thu, 03 Jul 2008 11:10:37 +0800,
jiangxingfeng 36340 wrote:
> 
> > At Wed, 02 Jul 2008 09:48:27 +0800,
> > jiangxingfeng 36340 wrote:
> > > 
> > > Hi,all:
> > > 
> > > The authors of RELOAD-4 have done a great work to address security
> > > issues in P2P system. But I don't think it addresses all security
> > > issues. Especially the malicious behaviors of authenticated peer are
> > > not well dealt with, for example, misroute the packet, discard the
> > > packet silently,etc.
> > 
> > Well, we certainly never claimed to address all security issues,
> > so I'm not going to disagree with that. 
> > 
> > That said, I don't really expect a basic p2p protocol to do much
> > to address this sort of low-grade packet mismanagement attack. 
> 
> I don't think it is a low-grade issue because its negative impact on the 
> routing. 

There are a large number of ways to damage routing. It's not clear
to me that these are especially bad, and, as I said earlier,
the defensive techniques depend primarily on the DHT.


> > As far as I know, the only techniques for dealing with misbehavior of
> > on-path (from the perspective of the DHT) attack are fairly 
> > inefficient.In any case, I would expect them to be DHT-dependent 
> > and therefore
> > isolated to the topology plugin (e.g., Maelstrom).
> > Is there some specific technical feature you believe should be in
> > RELOAD?
> 
> Although topology plugin can isolate specific mechanisms from the
> base protocol, the evovling security or other mechanisms have
> requirements for the protocol messages which should help the
> realization of the mechaisms. So that means at least RELOAD should
> support adding new messages or extending existing messages to
> achieve that.

RELOAD supports both of these already.

-Ekr
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to