[146371] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets?

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Mon Aug 26 12:10:16 2013

X-Original-To: cryptography@metzdowd.com
Date: Mon, 26 Aug 2013 12:09:55 -0400
From: "Perry E. Metzger" <perry@piermont.com>
To: "Christian Huitema" <huitema@huitema.net>
In-Reply-To: <07cb01cea1f8$2ec2c200$8c484600$@huitema.net>
Cc: 'Ralph Holz' <ralph-cryptometzger@ralphholz.de>, cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Sun, 25 Aug 2013 18:04:13 -0700 "Christian Huitema"
<huitema@huitema.net> wrote:
> Bottom line, anonymous DHT are fragile.

Though it appears that Tor uses them for its hidden service
directory. How does it do that robustly (or does it do it robustly)?
How do other users of DHTs handle attacks in practice (or is it just
that no one has tried attacking them enough?)

My back of the envelope says that there's little enough data needed
in the distributed data store I want that 1000x replication would not
be a serious problem. I presume that is not sufficient to make Sybil
attacks moot, given the size of modern botnets?

Perry
-- 
Perry E. Metzger		perry@piermont.com
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post