Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

In order to mitigate sybil attacks, peers should detect unusual request patterns #686

Open
sanity opened this issue Jun 23, 2023 · 2 comments
Labels
C-proposal Category: A proposal seeking feedback

Comments

@sanity
Copy link
Collaborator

sanity commented Jun 23, 2023

Peers should look for unusual statistical patterns in requests coming from their neighbors. For example, a bunch of new contracts being added all with unusually similar locations might be indicative of a Sybil attack. Peers with very unusual such patterns should be disconnected.

@sanity sanity added the C-proposal Category: A proposal seeking feedback label Jun 23, 2023
@Destroyinator69420
Copy link

I agree, there should be a strict definition of how a locutus node should behave. If a locutus node does not fit that pattern, then the connection should be dropped. If it does not behave exactly like the reference implementation, (the locutus node in this repository) then it should be shunned from the network. I also think that the symmetric encryption locutus uses should not place trust in a single algorithm. I would recommend AES-256(Kuznyechik-256(Kalyna-512(Message))). We shoudl use these algorithms in XTS mode. It would help the censorship resistance of Locutus if all messages sent through the network are of one standard size in the ciphertext, but from an outside observer they are compressed with ZSTD and padded by no more than 10%.

@ple1n
Copy link

ple1n commented Jun 30, 2023

Again, that's not really how censorship resistance works. You get easily detected if your packets are statistically uniform and 'featureless', and/or of same size. This is proven by https://gfw.report research and such.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C-proposal Category: A proposal seeking feedback
Projects
None yet
Development

No branches or pull requests

3 participants