View Issue Details

IDProjectCategoryView StatusLast Update
0003313GNUnetDHT servicepublic2018-06-07 01:14
ReporterBart PolotAssigned To 
PrioritynormalSeverityfeatureReproducibilityN/A
Status confirmedResolutionopen 
Product VersionSVN HEAD 
Target VersionFixed in Version 
Summary0003313: DHT GET randomization should increase with time
DescriptionSuccesive GET requests should increase the amount of randomization with succesive requests, in order to try to defeat Sybil attacks capable of eclipsing ALL randomized key from a smaller pool.
Additional InformationIf an attacker is able to eclipse 512 keys, randomizing over 8 bits would not work as all 256 keys are eclipsed. The GETs should start trying with 9 bits (which would also keep failing) and then 10 bits (with 1024 possible targets), which would eventually succeed.
TagsNo tags attached.

Relationships

related to 0003312 confirmed DHT GET should try randomized keys 
child of 0002454 confirmed key randomization via RO_BART is not implemented 

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2014-02-07 15:19 Bart Polot New Issue
2014-02-07 15:19 Bart Polot Status new => assigned
2014-02-07 15:19 Bart Polot Assigned To => Bart Polot
2014-02-07 15:19 Bart Polot Relationship added child of 0002454
2014-02-07 15:19 Bart Polot Relationship added related to 0003312
2014-04-11 15:15 Christian Grothoff Product Version => SVN HEAD
2014-04-11 15:15 Christian Grothoff Target Version => 0.11.0
2018-06-07 00:30 Christian Grothoff Target Version 0.11.0 =>
2018-06-07 01:14 Christian Grothoff Assigned To Bart Polot =>
2018-06-07 01:14 Christian Grothoff Status assigned => confirmed