Hi all,

I've just finished reading the draft
http://www.ietf.org/internet-drafts/draft-irtf-p2prg-rtc-security-01.txt

It occurs to me that the following attack scenario might be possible:

1. Client A registers its location, storing a tuple of the form <id_a, location_a, expiredtime> to a peer P in the DHT overlay (P also represents all replica nodes storing the key id_a)

2. Client B searches for A's location, as a result contacts P.

3. P decides to not give B the latest A's location. It either sends a out-of-date tuple regarding A's location or says that A is not in the network. A has no way to know or enforce P to behave properly.

It is a variation of the Denial of Service attack, in which the client A could be made completely unreachable to the other clients.

Assume the authenticity and integrity of all the tuples, would you say that this is a probable attack? My main concern is what incentives of P in doing this, especially in this P2P-SIP setting. I think this attack depends on the incentives model that encourages clients to act as peers in the DHT overlay. I would love to hear some reasonable explanation of why P would (and would not) engage in this attack.

Looking forwards to hear your comments.

Anh.




_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to