macmee Posted August 10, 2015 Report Share Posted August 10, 2015 I'm just curious in general about DHTs and found this great article on kademlia:http://gleamly.com/article/introduction-kademlia-dht-how-it-worksFrom what I understand and based on these resources on how the bittorrent DHT works:https://en.wikipedia.org/wiki/Mainline_DHTIt seems like, when I begin seeding a torrent, my client does the following:determines the key within the DHT corresponding to my torrentthe value for a key is a list of seeders, and my client inserts its own IP into that listbut, consider an attacker with 100 clients, what's to stop that attacker from inserting his own, or a bogus IP for the key for this torrent, even though the attacker is not seeding the torrent at all.And then, wouldn't it be the case that when some person X comes along to start downloading the torrent, when they look up the seeders in the DHT (find the value in the DHT for the key corresponding to the torrent), then wouldn't X get back a list of 100 bogus IPs and perhaps some small amount of legitimate seeders? Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.