View Issue Details

IDProjectCategoryView StatusLast Update
0003313GNUnetDHT servicepublic2018-06-07 01:14
ReporterBart Polot Assigned To 
Status confirmedResolutionopen 
Product VersionGit master 
Summary0003313: DHT GET randomization should increase with time
DescriptionSuccesive GET requests should increase the amount of randomization with succesive requests, in order to try to defeat Sybil attacks capable of eclipsing ALL randomized key from a smaller pool.
Additional InformationIf an attacker is able to eclipse 512 keys, randomizing over 8 bits would not work as all 256 keys are eclipsed. The GETs should start trying with 9 bits (which would also keep failing) and then 10 bits (with 1024 possible targets), which would eventually succeed.
TagsNo tags attached.


related to 0003312 confirmed DHT GET should try randomized keys 
child of 0002454 confirmed key randomization via RO_BART is not implemented 


There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2014-02-07 15:19 Bart Polot New Issue
2014-02-07 15:19 Bart Polot Status new => assigned
2014-02-07 15:19 Bart Polot Assigned To => Bart Polot
2014-02-07 15:19 Bart Polot Relationship added child of 0002454
2014-02-07 15:19 Bart Polot Relationship added related to 0003312
2014-04-11 15:15 Christian Grothoff Product Version => Git master
2014-04-11 15:15 Christian Grothoff Target Version => 0.11.0
2018-06-07 00:30 Christian Grothoff Target Version 0.11.0 =>
2018-06-07 01:14 Christian Grothoff Assigned To Bart Polot =>
2018-06-07 01:14 Christian Grothoff Status assigned => confirmed