plugeth/p2p/discover
Felix Lange de7af720d6 p2p/discover: implement node bonding
This a fix for an attack vector where the discovery protocol could be
used to amplify traffic in a DDOS attack. A malicious actor would send a
findnode request with the IP address and UDP port of the target as the
source address. The recipient of the findnode packet would then send a
neighbors packet (which is 16x the size of findnode) to the victim.

Our solution is to require a 'bond' with the sender of findnode. If no
bond exists, the findnode packet is not processed. A bond between nodes
α and β is created when α replies to a ping from β.

This (initial) version of the bonding implementation might still be
vulnerable against replay attacks during the expiration time window.
We will add stricter source address validation later.
2015-04-01 17:00:12 +02:00
..
node_test.go p2p/discover: add NodeID.Pubkey 2015-03-04 12:27:24 +01:00
node.go p2p/discover: implement node bonding 2015-04-01 17:00:12 +02:00
table_test.go p2p/discover: implement node bonding 2015-04-01 17:00:12 +02:00
table.go p2p/discover: implement node bonding 2015-04-01 17:00:12 +02:00
udp_test.go p2p/discover: implement node bonding 2015-04-01 17:00:12 +02:00
udp.go p2p/discover: implement node bonding 2015-04-01 17:00:12 +02:00