Bedeho Mender
2016-09-21 16:09:17 UTC
We are considering running a secondary DHT network for our client in order
to facilitate much faster peer discovery of peers which supports our
extension. Our plan is to run a second session/dht-node in the client, and
manually do get_peers/announce requests for torrents on our primary session.
The problem we are facing is that a malicious peer could easily inject
mainline peers into our secondary DHT. This is further exacerbated by the
fact that the two DHTs are indistinguishable at the protocol level, hence
mainline peers will respond to any requests which are made to them, further
introducing more mainline peers.
Do you have any suggestions for how to avoid this cross contamination?
Obviously no way to distinguish mainline peers from our peers, unless we
connect directly with them. However, we would at the very least want to
avoid mainline peers unwittingly contributing to further contamination. Do
we have to modify the DHT node to ignore all responses from peers which
have a v-key that does not match what we expect?
Best
Bedeho
ᐧ
------------------------------------------------------------------------------
to facilitate much faster peer discovery of peers which supports our
extension. Our plan is to run a second session/dht-node in the client, and
manually do get_peers/announce requests for torrents on our primary session.
The problem we are facing is that a malicious peer could easily inject
mainline peers into our secondary DHT. This is further exacerbated by the
fact that the two DHTs are indistinguishable at the protocol level, hence
mainline peers will respond to any requests which are made to them, further
introducing more mainline peers.
Do you have any suggestions for how to avoid this cross contamination?
Obviously no way to distinguish mainline peers from our peers, unless we
connect directly with them. However, we would at the very least want to
avoid mainline peers unwittingly contributing to further contamination. Do
we have to modify the DHT node to ignore all responses from peers which
have a v-key that does not match what we expect?
Best
Bedeho
ᐧ
------------------------------------------------------------------------------