Changes between Version 3 and Version 4 of thesis


Ignore:
Timestamp:
Apr 11, 2011 1:39:24 AM (8 years ago)
Author:
zzz
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • thesis

    v3 v4  
    77Table 5.5: What about 3-hop, which is the default for eepsites?
    88
     9Sec 6 Discussion:
     10
     11  Paper's recommendations:
     12
     13   1) Limit churn:
     14
     15    2) Distributed HTTP services:
     16
     17    3) Use random peers for leases (guard nodes):
     18
     19
     20
    921Sec 7 Conclusion:
    1022 1) Timetable of 0.8.4 release:
    1123Released March 2, installed in 25% of network by ~March 4, 50% by ~March 6, 75% by ~March 14 (source http://stats.i2p.to/cgi-bin/total_routers_3month.cgi )
    12 2) Relevant changes in 0.8.4 release:
    13     a) Prevent tunnel-building DOS by a single source
    14     b) penalize peers more due to tunnel rejections. This did not change the time constants of the capacity formulas, just changed (a + r) to (a + 2r) in the denominator of the forumla in section A.1.
    15 3) More changes to detect and prevent DOS are upcoming in 0.8.5 (scheduled for release the week of April 18) but these are not a complete solution. A fully distributed tunnel-building DDOS is difficult to prevent completely.
     24
     25 2) Relevant changes in 0.8.4 release:
     26    a) Prevent tunnel-building DOS by a single source. This was done in reaction to the attack.
     27    b) Penalize peers more due to tunnel rejections. This did not change the time constants of the capacity formulas, just changed (a + r) to (a + 2r) in the denominator of the forumla in section A.1. However it may have had the effect of reacting faster to a DOS attack. This change was not made in reaction to the attack, but was previously planned and is part of a strategy to spread the traffic across more peers in the network and adjust the forumla in response to network conditions that have changed markedly in the past two years.
     28
     29 3) More changes to detect and prevent DOS are upcoming in 0.8.5 (scheduled for release the week of April 18) but these are not a complete solution. A fully distributed tunnel-building DDOS is difficult to prevent completely.