View Issue Details

IDProjectCategoryView StatusLast Update
0003313GNUnetDHT servicepublic2021-12-31 09:20
ReporterBart Polot Assigned Toschanzen  
PrioritynormalSeverityfeatureReproducibilityN/A
Status assignedResolutionopen 
Product VersionGit master 
Summary0003313: DHT GET randomization should increase with time
DescriptionSuccesive GET requests should increase the amount of randomization with succesive requests, in order to try to defeat Sybil attacks capable of eclipsing ALL randomized key from a smaller pool.
Additional InformationIf an attacker is able to eclipse 512 keys, randomizing over 8 bits would not work as all 256 keys are eclipsed. The GETs should start trying with 9 bits (which would also keep failing) and then 10 bits (with 1024 possible targets), which would eventually succeed.
Tagslsd0004

Relationships

related to 0003312 assignedschanzen DHT GET should try randomized keys 
child of 0002454 assignedschanzen key randomization via RO_BART is not implemented 

Activities

schanzen

2021-12-31 09:20

manager   ~0018605

Is this relevant? LSD0004?

Issue History

Date Modified Username Field Change
2014-02-07 15:19 Bart Polot New Issue
2014-02-07 15:19 Bart Polot Status new => assigned
2014-02-07 15:19 Bart Polot Assigned To => Bart Polot
2014-02-07 15:19 Bart Polot Relationship added child of 0002454
2014-02-07 15:19 Bart Polot Relationship added related to 0003312
2014-04-11 15:15 Christian Grothoff Product Version => Git master
2014-04-11 15:15 Christian Grothoff Target Version => 0.11.0
2018-06-07 00:30 Christian Grothoff Target Version 0.11.0 =>
2018-06-07 01:14 Christian Grothoff Assigned To Bart Polot =>
2018-06-07 01:14 Christian Grothoff Status assigned => confirmed
2021-12-31 09:20 schanzen Tag Attached: lsd0004
2021-12-31 09:20 schanzen Assigned To => schanzen
2021-12-31 09:20 schanzen Status confirmed => assigned
2021-12-31 09:20 schanzen Note Added: 0018605