Isidor Zeuner [ARCHIVE] on Nostr: š
Original date posted:2014-01-16 š Original message:quote: > > but then you ...
š
Original date posted:2014-01-16
š Original message:quote:
> > but then you remove the implication that a node has to give both public
> > and private IPs to a peer. If it's part of a batch of "addr"s, it could be
> > my own hidden service ID, but it could also be one that I learned from
> > someone else and is now propagating, for anyone to bootstrap with Tor
> > hidden service peers if they'd like.
> >
>
> Hmm. So you mean that we pick a set of peers we believe to not be sybils of
> each other, but they might give us hidden services run by other people? I
> need to think about that. If they're getting the hidden services just from
> addr announcements themselves, then you just punt the issue up a layer -
> what stops me generating 10000 hidden service keys that all map to my same
> malicious node, announcing them, and then waiting for the traffic to
> arrive? If clearnet nodes inform of their own hidden service IDs, that
> issue is avoided.
>
Considering that the clearnet sybil protection also relies on scaling
up the resource requirements for an attacker, why not require hidden
service addresses following a certain pattern, like a fixed prefix?
Essentially also a PoW scheme...
> My goal here is not necessarily to hide P2P nodes - we still need lots of
> clearnet P2P nodes for the forseeable future no matter what.
What would you consider as the main merits of clearnet nodes?
Best regards,
Isidor
Published at
2023-06-07 15:12:09Event JSON
{
"id": "625bc632ac4e3e096b3248b19b32f9ce1a7a4db5da4f5d45ff1812368a5e10c7",
"pubkey": "70950d9ef527ee56cd47d1cec909c3ddfa69de32fbea13cad10641ee6dc93e39",
"created_at": 1686150729,
"kind": 1,
"tags": [
[
"e",
"611ceaa526b00a1109fcff43c9c84b86475a1a1e055ca0ce884283c7fc0d8b94",
"",
"root"
],
[
"e",
"b74ecaa9056fdf2869444a89efdc42706b454db8d5d1a6cc0e2f0a51e35fab2c",
"",
"reply"
],
[
"p",
"f2c95df3766562e3b96b79a0254881c59e8639f23987846961cf55412a77f6f2"
]
],
"content": "š
Original date posted:2014-01-16\nš Original message:quote:\n\u003e \u003e but then you remove the implication that a node has to give both public\n\u003e \u003e and private IPs to a peer. If it's part of a batch of \"addr\"s, it could be\n\u003e \u003e my own hidden service ID, but it could also be one that I learned from\n\u003e \u003e someone else and is now propagating, for anyone to bootstrap with Tor\n\u003e \u003e hidden service peers if they'd like.\n\u003e \u003e\n\u003e\n\u003e Hmm. So you mean that we pick a set of peers we believe to not be sybils of\n\u003e each other, but they might give us hidden services run by other people? I\n\u003e need to think about that. If they're getting the hidden services just from\n\u003e addr announcements themselves, then you just punt the issue up a layer -\n\u003e what stops me generating 10000 hidden service keys that all map to my same\n\u003e malicious node, announcing them, and then waiting for the traffic to\n\u003e arrive? If clearnet nodes inform of their own hidden service IDs, that\n\u003e issue is avoided.\n\u003e\n\nConsidering that the clearnet sybil protection also relies on scaling\nup the resource requirements for an attacker, why not require hidden\nservice addresses following a certain pattern, like a fixed prefix?\nEssentially also a PoW scheme...\n\n\u003e My goal here is not necessarily to hide P2P nodes - we still need lots of\n\u003e clearnet P2P nodes for the forseeable future no matter what.\n\nWhat would you consider as the main merits of clearnet nodes?\n\nBest regards,\n\nIsidor",
"sig": "24306d0a9c0e7e07d75e8b8e3b9b4ee99b8f3a5e9e76a7e27085b46799f7944046f3c7b4ecd4fb8a64169a82438a798dbd1d285ea554e39e61faa2022e08c5c2"
}