protect against UDP spoofig and amplification attacks #81
Labels
No labels
ActivityPub
advanced features
basic functionality
bug
DHT
evaluation
refactoring
security
test case
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: schmittlauch/Hash2Pub#81
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The DHT protocol might be vulnerable to amplification attacks as responses are sent without the need for a successful handshake, allowing responses to spoofed requests to be sent.
Validating the node ID by recalculation does not help as both IP and domain can be spoofed in the request.
Example: Spoofed queryID request asks for lookup of an ID, requests 10 closest nodes as answer -> amplification factor ~ 10