[e2e] 100% NAT - a DoS proof internet

Joe Touch touch at ISI.EDU
Tue Feb 14 13:16:28 PST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Christian Huitema wrote:
>>Jon Crowcroft wrote:
>>
>>>um, i think you need to re-read about DHTs and consistent hashes
>>
>>What I was saying was that this variant won't work behind a NAT. I
>>mistook that from your initial post; I still consider it accurate, but
>>it may be off topic.

Per below, "off topic" in response to Jon's initial post, not "off topic
for this list". (FWIW, all my recent posts have been individual; I
usually sign posts as list admin as such)

> Protecting DHT against DOS attacks is indeed a big issue. Consider:
> 
> 1) The nodes participating in the DHT need an open communication port
> which is ipso facto a target for DOS attacks,
> 2) The nodes observing the DHT learn these ports, and also the addresses
> of many other nodes, enabling various forms of attack propagation,
> 3) The DHT application itself can be victim of DOS attacks, e.g. various
> forms of name injection, query overload, response spoofing.
> 
> In fact, solving such issues is an interesting challenge for end-to-end
> researchers!

Yes, DHT under DOS attacks is.

IMO, DHT behind NATs is too, but AFAICT they don't work behind NATs any
better than any other application-layer service.

Joe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFD8kisE5f5cImnZrsRArS3AKC/chUB1U1lE88sxwueVPorCEzo+ACgqnk0
/mo+vupBj2oJyFjqj0R50Ps=
=aJOy
-----END PGP SIGNATURE-----


More information about the end2end-interest mailing list