Changes between Version 25 and Version 26 of thesis


Ignore:
Timestamp:
Apr 12, 2011 6:56:19 PM (9 years ago)
Author:
zzz
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • thesis

    v25 v26  
    4242  Also not discussed - effect of leaseset size (number of leases or inbound tunnels) which is user-configurable from 1 to 6. It also is configurably dynamic, with less leases when the server is idle. A high number of leases makes it quicker for an adversary to enumerate the fast peers. I assume you used the default setting of 2 leases for your experimental victim.
    4343
     44  Also not discussed - you started from the end, i.e. the identity of the victim, then your whole experiment was to confirm it. To find the victim from scratch would require another O(n) in time or resources, where n is the size of the network, i.e. you have to run the experiment on each router in the network.
     45
    4446  Unidirectional tunnels as a "bad design decision":
    4547   A bold and absolute statement not fully supported by the paper. It clearly mitigates other attacks and it's not clear how to trade off the risk of the attack described here (either currently or after implementing one or more of the recommendations below) with attacks on a bidirectional tunnel architecture.
     
    6264      Benefits / downsides? What happens if an adversary attacks guard nodes (either in I2P or Tor)?
    6365
    64   Obvious recommendations not mentioned:
     66  Additional possible changes to I2P not mentioned:
    6567
    6668   1) Increase resistance to low-bandwidth tunnel building DDoS attack:
     
    7274
    7375   4) Disallow multiples from the same /16 in the fast tier
     76
     77   5) Increase fast and high-capacity tier maximum sizes
    7478
    7579Sec 7 Conclusion: