the forums at degreez.net

It is currently Thu Apr 18, 2024 4:55 pm

All times are UTC - 7 hours [ DST ]




Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 15 posts ] 
Author Message
 Post subject: Get peers extension
PostPosted: Wed Mar 24, 2004 4:45 am 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
Hi,

Could you implement this extension?
It should be quite easy if you're comfortable with Python (which I am not).

Handshake:
int64: 2 (byte 7, bit 1)

Messages:
get_peers:
int32: 7
int8: 11
int16: local port

When get_peers is received, send peers unless peers was send less than five minutes ago

peers:
int32: 7 + 6 * count
int8: 12
int16: local port

int32: host
int16: port

When peers is received, ignore the message if get_peers was not send less than one minute ago


Top
 Profile  
 
 Post subject:
PostPosted: Wed Mar 24, 2004 3:16 pm 
Offline

Joined: Sun Mar 07, 2004 10:05 am
Posts: 1212
NO. Gossip functions are prone to turn P2P systems into DDoS engines. We are working on ways of doing it properly, to reduce the chances of this problem, but until then there will be no such extensions.


Top
 Profile  
 
 Post subject:
PostPosted: Thu Mar 25, 2004 2:11 pm 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
If you only send out addresses of peers you're currently connected too and only accept addresses of peers you asked, then how can this be prone to DDoS?


Top
 Profile  
 
 Post subject:
PostPosted: Sat Mar 27, 2004 5:33 pm 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
Could you at least tell me what is wrong with my design?


Top
 Profile  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 7:47 am 
Because the peer you are connected to could simply ly to you about his peers.
Just take a torrent with a lot of leechers, connect to the tracker to get peers and tell all of them ip and port numbers of the client(s) you want to ddos. You can even ul/dl some parts of the file to look serious.
As TheSHAD0W said it is already thought of implementing something like this, but it needs to be more foolproof.


Top
  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 10:54 am 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
So you connect to 1000 peers, tell 1000 peers the address you want to DDoS and all of those peers will try a single TCP connection to the target.
The target receives 1000 connect requests.
Wouldn't it be much faster and simpler to send the connect requests yourself?
It'd also cost you less bandwidth, so I don't see how this extension can help DDoS attacks.


Top
 Profile  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 11:54 am 
xtf wrote:
So you connect to 1000 peers, tell 1000 peers the address you want to DDoS and all of those peers will try a single TCP connection to the target.
The target receives 1000 connect requests.
Wouldn't it be much faster and simpler to send the connect requests yourself?
It'd also cost you less bandwidth, so I don't see how this extension can help DDoS attacks.


Or rather, they submit a list of 20 or so addresses they want to DDoS and each peer of the 1000 tries to make a connection -- at which point the attacker has caused 20x the number of connections that they could send out themselves.


Top
  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 2:08 pm 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
Eh, peers are only supposed to forward addresses of currently active connections, so your theory doesn't work.


Top
 Profile  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 3:25 pm 
Offline

Joined: Mon Mar 15, 2004 8:35 am
Posts: 418
but not all peers can be trustworthy.


Top
 Profile  
 
 Post subject:
PostPosted: Fri Apr 09, 2004 9:32 pm 
Offline

Joined: Sun Mar 07, 2004 10:05 am
Posts: 1212
You wouldn't wind up with a real amplification effect, probably, but a TCP connect flood (assuming the DoS is pointed at an active port) can cause a lot of damage, especially since the attacker would be redirecting his attack from a large number of different IPs, and it would also be difficult to trace the attacker back.

We're working on ways to minimize this sort of feature's usefulness as a DoS engine, and will release a specification when we can.


Top
 Profile  
 
 Post subject:
PostPosted: Sat Apr 10, 2004 2:07 am 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
bytetorrent wrote:
but not all peers can be trustworthy.

Why not?
Because they're attackers or badly coded?
If the first case, it's still easier and faster to send the connect packets directly.
In the second case, there's little you can do.


Top
 Profile  
 
 Post subject:
PostPosted: Sat Apr 10, 2004 2:11 am 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
TheSHAD0W wrote:
You wouldn't wind up with a real amplification effect, probably, but a TCP connect flood (assuming the DoS is pointed at an active port) can cause a lot of damage, especially since the attacker would be redirecting his attack from a large number of different IPs, and it would also be difficult to trace the attacker back.

We're working on ways to minimize this sort of feature's usefulness as a DoS engine, and will release a specification when we can.

With IP spoofing, the attacker can cause the same effect all by himself.


Top
 Profile  
 
 Post subject:
PostPosted: Sat Apr 10, 2004 8:33 am 
Offline

Joined: Sun Mar 07, 2004 10:05 am
Posts: 1212
A SYN flood can be IP-spoofed. An actual connection flood can use much more resources per connection.


Top
 Profile  
 
 Post subject:
PostPosted: Sun Apr 11, 2004 3:11 am 
Offline

Joined: Sat Mar 20, 2004 1:58 pm
Posts: 20
True, but besides IP spoofing, what other advantages does this have for the attacker over a direct attack?


Top
 Profile  
 
 Post subject:
PostPosted: Sun Apr 11, 2004 2:45 pm 
Offline

Joined: Sun Mar 07, 2004 10:05 am
Posts: 1212
The spoofing is bad enough to make me want to fix things so it won't work.


Top
 Profile  
 
Display posts from previous:  Sort by  
Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 15 posts ] 

All times are UTC - 7 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 106 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
cron
Powered by phpBB® Forum Software © phpBB Group