[p2p-hackers] "generic & secure" DHT table implementation?
Ivan Shmakov
oneingray at gmail.com
Mon Oct 15 22:25:08 PDT 2012
Abstract
There're (several?) BitTorrent-specific DHT's, and the P2P
anonymity protocols (such as GNUnet) seem to (effectively)
implement their own DHT's. But is there any kind of a
buniversalb (i. e., transport protocol-independent) DHT? And if
not, why?
Searching by content-derived identifiers
There're currently a number of P2P-friendly content-derived
resource identifiers, such as the BitTorrent binfohashb values
(which can be embedded within magnet: schema URI's, like [1]),
as well as the URI's used in GNUnet and Freenet frameworks (like
[2]), both non-standard (and the GNUnet ones are, as it seems,
interpreting the base URI specification in somewhat an odd way.)
What seems to be missing, however, is a bgenericb DHT network
that could be used to search both the relevant metadata (such as
.torrent or Metalink files), and the peers participating in a
particular data exchange (and the respective protocols they
support), using one or more of an extensible set of identifiers
(including BitTorrent infohashes, GNUnet URI's, and the plain
SHA-1, SHA-2, or SHA-3 values.)
How's it useful?
With such a DHT, Alice, having only a bandwidth-limited Internet
connection, could compute a SHA-256 of a large file on her host,
and send the former to Bob, which, in turn, would use any
downloading software (implementing the support for the
aforementioned bgenericb DHT) to discover the possible sources
for the file in question and retrieve it.
Security issues
As for the security, the brecordsb in such a table could be
digitally signed, with the set of the btrustedb public keys
being comprised of those keys explicitly approved by the user,
the public keys of the peers with which a successful data
exchange has occurred before, and the public keys trusted by the
peers already trusted, up to a certain depth. (There could then
be different levels of trust, just like, e. g., in GnuPG, and
perhaps other OpenPGP software.)
The purpose of such a facility is exactly to allow for the use
of (non-piecewise) digest to metadata records, which otherwise
could easily be spoofed, and used to force the downloader to
spend its resources to download an otherwise irrelevant data.
The question
The question is: are there any designs, either implemented, or
described in detail, allowing for operation as described above,
or are there specific reasons for which the outline above is not
feasible to implement?
TIA.
[1] magnet:?xt=urn:btih:fb5c0d7946469ba48121607458e360cb31336e55
[2] gnunet://ecrs/chk/9E4MDN4VULE8KJG6U1C8FKH5HA8C5CHSJTILRTTPGK8MJ6VHORERHE68JU8Q0FDTOH1DGLUJ3NLE99N0ML0N9PIBAGKG7MNPBTT6UKG.1I823C58O3LKS24LLI9KB384LH82LGF9GUQRJHACCUINSCQH36SI4NF88CMAET3T3BHI93D4S0M5CC6MVDL1K8GFKVBN69Q6T307U6O.17992
--
FSF associate member #7257
_______________________________________________
p2p-hackers mailing list
p2p-hackers at lists.zooko.com
http://lists.zooko.com/mailman/listinfo/p2p-hackers
----- End forwarded message -----
--
Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org
______________________________________________________________
ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE
More information about the Testlist
mailing list