summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorirungentoo <irungentoo@gmail.com>2013-07-11 08:41:24 -0400
committerirungentoo <irungentoo@gmail.com>2013-07-11 08:41:24 -0400
commit1989246f49dc8599a4ca67199f7cc7b94a2bb294 (patch)
tree0062b84a77a3b620af5fc56fdfc01306f1b4aaa0 /docs
parenta20efb7c1bf5a8229c451ea17c65b25cc25ed521 (diff)
Some more ideas on how to harden the DHT.
Diffstat (limited to 'docs')
-rw-r--r--docs/DHT_hardening.txt17
1 files changed, 17 insertions, 0 deletions
diff --git a/docs/DHT_hardening.txt b/docs/DHT_hardening.txt
index 1f63c90c..59c6ae39 100644
--- a/docs/DHT_hardening.txt
+++ b/docs/DHT_hardening.txt
@@ -14,4 +14,21 @@ Each client_id is the public key of the peer so it would be trivial to encrypt
14the DHT requests with crypto_box(). This would completely defeat the first 14the DHT requests with crypto_box(). This would completely defeat the first
15attack. 15attack.
16 16
17Make each peer send the information of at least one of his online friends in
18every send nodes response. (Might be bad as any node can now know who our
19friends are)
20
21Limit the maximum number of peers with identical ips that we keep connected to
22in our DHT. (Not a real solution)
23
24Require each node to solve some kind of captcha in order to connect to the
25network. (Bad idea.)
26
27Require nodes to crack hashes or solve other computationally intensive
28problems in order to be accepted in the network. (Kind of like bitcoin)(This is
29probably a bad idea as our application needs to work on phones which are low
30power devices)
31
32Make each node test other nodes to see if they respond correctly before sending
33them as part of their send nodes response.
17... 34...