mirror of
https://github.com/irungentoo/toxcore.git
synced 2024-03-22 13:30:51 +08:00
Some more ideas on how to harden the DHT.
This commit is contained in:
parent
a20efb7c1b
commit
1989246f49
|
@ -14,4 +14,21 @@ Each client_id is the public key of the peer so it would be trivial to encrypt
|
||||||
the DHT requests with crypto_box(). This would completely defeat the first
|
the DHT requests with crypto_box(). This would completely defeat the first
|
||||||
attack.
|
attack.
|
||||||
|
|
||||||
|
Make each peer send the information of at least one of his online friends in
|
||||||
|
every send nodes response. (Might be bad as any node can now know who our
|
||||||
|
friends are)
|
||||||
|
|
||||||
|
Limit the maximum number of peers with identical ips that we keep connected to
|
||||||
|
in our DHT. (Not a real solution)
|
||||||
|
|
||||||
|
Require each node to solve some kind of captcha in order to connect to the
|
||||||
|
network. (Bad idea.)
|
||||||
|
|
||||||
|
Require nodes to crack hashes or solve other computationally intensive
|
||||||
|
problems in order to be accepted in the network. (Kind of like bitcoin)(This is
|
||||||
|
probably a bad idea as our application needs to work on phones which are low
|
||||||
|
power devices)
|
||||||
|
|
||||||
|
Make each node test other nodes to see if they respond correctly before sending
|
||||||
|
them as part of their send nodes response.
|
||||||
...
|
...
|
||||||
|
|
Loading…
Reference in New Issue
Block a user