Secure Content Distribution Using Untrusted Servers Kevin Fu

Total Page:16

File Type:pdf, Size:1020Kb

Secure Content Distribution Using Untrusted Servers Kevin Fu Secure content distribution using untrusted servers Kevin Fu MIT Computer Science and Artificial Intelligence Lab in collaboration with M. Frans Kaashoek (MIT), Mahesh Kallahalla (DoCoMo Labs), Seny Kamara (JHU), Yoshi Kohno (UCSD), David Mazières (NYU), Raj Rajagopalan (HP Labs), Ron Rivest (MIT), Ram Swaminathan (HP Labs) For Peter Szolovits slide #1 January-April 2005 How do we distribute content? For Peter Szolovits slide #2 January-April 2005 We pay services For Peter Szolovits slide #3 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We coerce friends For Peter Szolovits slide #4 January-April 2005 We enlist volunteers For Peter Szolovits slide #5 January-April 2005 Fast content distribution, so what’s left? • Clients want ◦ Authenticated content ◦ Example: software updates, virus scanners • Publishers want ◦ Access control ◦ Example: online newspapers But what if • Servers are untrusted • Malicious parties control the network For Peter Szolovits slide #6 January-April 2005 Taxonomy of content Content Many-writer Single-writer General purpose file systems Many-reader Single-reader Content distribution Personal storage Public Private For Peter Szolovits slide #7 January-April 2005 Framework • Publishers write➜ content, manage keys • Clients read/verify➜ content, trust publisher • Untrusted servers replicate➜ content • File system protects➜ data and metadata For Peter Szolovits slide #8 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only ◦ Public content distributed by untrusted servers • Decentralized access control ◦ Private content distributed by untrusted servers ◦ Efficient client eviction ◦ Efficient key distribution • Implementation and performance measurements For Peter Szolovits slide #9 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only ◦ Public content distributed by untrusted servers • Decentralized access control Chefs➜ ◦ Private content distributed by untrusted servers ◦ Efficient client eviction ◦ Efficient key distribution • Implementation and performance measurements For Peter Szolovits slide #9 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only ◦ Public content distributed by untrusted servers • Decentralized access control Chefs➜ ◦ Private content distributed by untrusted servers ◦ Efficient client eviction Lazy➜ revocation ◦ Efficient key distribution Key➜ regression • Implementation and performance measurements For Peter Szolovits slide #9 January-April 2005 Contributions • Authenticated content distribution SFSRO➜ ◦ Self-certifying File System Read-Only ◦ Public content distributed by untrusted servers • Decentralized access control Chefs➜ ◦ Private content distributed by untrusted servers ◦ Efficient client eviction Lazy➜ revocation ◦ Efficient key distribution Key➜ regression • Implementation and performance measurements It➜ works too! For Peter Szolovits slide #9 January-April 2005 SFSRO For Peter Szolovits slide #10 January-April 2005 SFSRO challenges How can we authenticate content and also • Provide incremental updates? • Authenticate partial downloads? • Scale servers to many clients? For Peter Szolovits slide #11 January-April 2005 Signed software packages: part of your complete breakfast For Peter Szolovits slide #12 January-April 2005 Signed software packages: part of your complete breakfast For Peter Szolovits slide #12 January-April 2005 Signed software packages: part of your complete breakfast • Authenticated For Peter Szolovits slide #12 January-April 2005 Signed software packages: part of your complete breakfast • Authenticated • No revocation ✘ • No incremental updates ✘ • No integrity of file collections ✘ For Peter Szolovits slide #12 January-April 2005 Is your collection of software authentic? 3dchess 3ddesktop 3dwm-clock 3dwm-csgclient 3dwm-geoclient 3dwm-pickclient 3dwm-server 3dwm-texclient 3dwm-vncclient 44bsd-rdist 6tunnel 9menu 9wm a2ps a2ps-perl-ja aa3d aalib-bin aalib1 aalib1-dev aap aap-doc aatv abc2ps abcde abcm2ps abcmidi abcmidi-yaps abicheck abntex abook aboot-base aboot-cross acct ace-of-penguins acfax acheck acheck-rules acheck-rules-fr achilles acidlab acidlab-doc acidlab-mysql acidlab-pgsql acidwarp ack aclock.app acm acm4 aconnectgui acorn-fdisk acovea acovea-results acpi acpid acs ada-mode ada-reference-manual adabrowse adacgi addresses-goodies-for-gnustep addresses.framework addressmanager.app addressview.framework adduser-ng adduser-ng-doc adduser-ng-doc-devel adduser-plugin-bkdinit adduser-plugin-cvsaccess adduser-plugin-eximconf adduser-plugin-eximconf4 adduser-plugin-notifyjabber adduser-plugin-quota adduser-ui-cdk adjtimex admesh adonthell adonthell-data adtool advi adzapper aee aegis aegis-doc aegis-tk aegis-virus-scanner aegis-web aegis3 aegis3-doc aegis3-tk aegis3-web aeromail aewm aewm++ aewm++-goodies af afbackup afbackup-client afbackup-common affiche affix affix-common affix-headers affix-source afio aft agenda.app aget aggregate agistudio agsync agsync-dev aiksaurus aime aime-doc aircrack airsnort airstrike airstrike-common aish akregator akregator-i18n akregator-konq-plugin akregator-kontact-plugin aladin alamin-client alamin-doc alamin-mysql alamin-server alamin-smpp albert alcovebook-sgml alcovebook-sgml-doc ale aleph aleph-dev aleph-doc aleph-emacs alevt alevtd alex alexandria alicq alien allegro-demo allegro-demo-data allegro-examples alleyoop alsa-modules-2.4-386 alsa-modules-2.4-586tsc alsa-modules-2.4-686 alsa-modules-2.4-686-smp alsa-modules-2.4-k6 alsa-modules-2.4-k7 alsa-modules-2.4-k7-smp alsa-modules-2.4.27-2-386 alsa-modules-2.4.27-2-586tsc alsa-modules-2.4.27-2-686 alsa-modules-2.4.27-2-686-smp alsa-modules-2.4.27-2-k6 alsa-modules-2.4.27-2-k7 alsa-modules-2.4.27-2-k7-smp alsa-oss alsamixergui altgcc am-utils am-utils-doc amanda-client amanda-common amanda-server amap amaterus amavis-stats amavisd-new amavisd-new-milter amaya amd amd64-libs amd64-libs-dev ami amiga-fdisk-cross amor amphetamine amphetamine-data ample amrita ams amsn amsynth an anacron analog anarchism and angband-doc animal-dev animal0 animals animals-game anjuta anjuta-common annodex-tools annoyance-filter annoyance-filter-doc ant-phone anteater anthy anthy-el antiword ao40tlmview aolserver aolserver-dev aolserver-doc aolserver-nscache aolserver-nsencrypt aolserver-nsopenssl aolserver-nspostgres aolserver-nssha1 aolserver-nsvhr ap-utils apachetop apcalc apcalc-common apcalc-dev apcd apel apg aplus-fsf aplus-fsf-dev aplus-fsf-doc aplus-fsf-el apmd apollon apoo appunti-informatica-libera aprsd aprsdigi apt-build apt-dpkg-ref apt-file apt-howto apt-howto-ca apt-howto-common apt-howto-de apt-howto-el apt-howto-en apt-howto-es apt-howto-fr apt-howto-it apt-howto-ja apt-howto-ko apt-howto-pl apt-howto-pt-br apt-howto-ru apt-howto-tr apt-listbugs apt-listchanges apt-move apt-rdepends apt-show-source apt-show-versions apt-spy apt-src apt-watch apt-zip aptconf aptitude aptitude-doc-cs aptitude-doc-en apwal aqmoney aqsis aqsis-libs aqsis-libs-dev arabtex aranym arc arch-buildpackage archivemail archway archzoom argus-client argus-server aria aribas arj ark arkhart arkrpg arla arla-dev arla-modules-source armagetron armagetron-common armagetron-server arpack++ arpd arping arptables arpwatch artist arts artwiz-cursor asc-music ascd ascdc ascii asciijump asclassic asclock asclock-themes ascpu asd4 asd4-clients ash asis-programs asiya24-vfont asmail asmem asmix asmixer asmon asmounter asn1-mode asp aspell-bn aspell-sl aspell-tl asr-manpages asterisk-chan-capi asterisk-prompt-de asterisk-prompt-fr astyle aswiki at at-spi at-spi-doc atanks atanks-data atari-fdisk-cross aterm aterm-ml atfs atfs-dev atftp atftpd athena-jot atitvout atlantik atlantik-dev atlas-doc atlas-test atlas2-3dnow atlas2-3dnow-dev atlas2-base atlas2-base-dev atlas2-headers atlas2-sse atlas2-sse-dev atlas2-sse2 atlas2-sse2-dev atlas3-3dnow atlas3-3dnow-dev atlas3-base atlas3-base-dev atlas3-doc atlas3-headers atlas3-sse atlas3-sse-dev atlas3-sse2 atlas3-sse2-dev atlas3-test atlc atlc-examples atm-dev atm-tools atom4 atool atop atp atris atsar aub auctex audacity audiolink audiooss august aumix aumix-gtk authbind auto-apt autobook autoclass autoconf autoconf-archive autoconf2.13 autodia autodns-dhcp autogen autoinstall autoinstall-common-source autoinstall-hppa autoinstall-i386 autolog automake1.4 automake1.6 automake1.7 automake1.8 autopilot autoproject autopsy autossh autotools-dev autotrace ava aview avr-libc avra avrp avrprog away awesfx awstats ax25-apps ax25-tools ax25-xtools ax25spyd axel axel-kapt axiom axiom-databases axiom-doc axiom-source axiom-test axiom-tex axkit axkit-examples axkit-language-htmldoc axkit-language-query axkit-xsp-webutils axp axyl axyl-doc axyl-lucene ayttm ayuda babygimp backup2l backupninja baken balsa bamboo bandersnatch bandersnatch-frontend barcode barrage base-files base-passwd bash3 bash3-doc basket bastet bastille battery-stats battfink battleball baycomepp baycomusb bb bbappconf bbdate bbdb bbkeys bblaunch bbmail bbpager bbpal bbppp bbsload bbtime bcc bchunk bclock bcm4400-source bcrypt bdfresize beancounter beast beav beaver beep beep-media-player beep-media-player-dev beepcore-c-dev beepcore-c0 beneath-a-steel-sky bf-utf-source bfbtester bfr bg5cc bg5ps bglibs-dev bglibs-doc bhl biabam bibclean bibcursed bibindex bible-kjv bible-kjv-text bibletime bibletime-i18n bibtex2html bibtool bibtool-dev bibview bicyclerepair bidentd bidiv biew biff big-cursor billard-gl billard-gl-data
Recommended publications
  • Formal Verification of Eccs for Memories Using ACL2
    Journal of Electronic Testing (2020) 36:643–663 https://doi.org/10.1007/s10836-020-05904-2 Formal Verification of ECCs for Memories Using ACL2 Mahum Naseer1 · Waqar Ahmad1 · Osman Hasan1 Received: 12 April 2020 / Accepted: 2 September 2020 / Published online: 26 September 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020 Abstract Due to the ever-increasing toll of soft errors in memories, Error Correction Codes (ECCs) like Hamming and Reed-Solomon Codes have been used to protect data in memories, in applications ranging from space to terresterial work stations. In past seven decades, most of the research has focused on providing better ECC strategies for data integrity in memories, but the same pace research efforts have not been made to develop better verification methodologies for the newer ECCs. As the memory sizes keep increasing, exhaustive simulation-based testing of ECCs is no longer practical. Hence, formal verification, particularly theorem proving, provides an efficient, yet scarcely explored, alternative for ECC verification. We propose a framework, with extensible libraries, for the formal verification of ECCs using the ACL2 theorem prover. The framework is easy to use and particularly targets the needs of formally verified ECCs in memories. We also demonstrate the usefulness of the proposed framework by verifying two of the most commonly used ECCs, i.e., Hamming and Convolutional codes. To illustrate that the ECCs verified using our formal framework are practically reliable, we utilized a formal record- based memory model to formally verify that the inherent properties of the ECCs like hamming distance, codeword decoding, and error detection/correction remain consistent even when the ECC is implemented on the memory.
    [Show full text]
  • Creating Formally Verified Components for Layered
    Creating Formally Verified Components for Layered Assurance with an LLVM to ACL2 Translator∗ y z David S. Hardin Jedidiah R. McClurg Jennifer A. Davis Advanced Technology Center Department of Computer Advanced Technology Center Rockwell Collins Science Rockwell Collins Cedar Rapids, IA, USA University of Colorado Cedar Rapids, IA, USA [email protected] Boulder, CO, USA [email protected] [email protected] ABSTRACT Keywords In our current work, we need to create a library of formally Formal verification, Theorem proving, ACL2, LLVM verified software component models from code that has been compiled (or decompiled) using the Low-Level Virtual Ma- 1. INTRODUCTION chine (LLVM) intermediate form; these components, in turn, are to be assembled into subsystems whose top-level assur- ance relies on the assurance of the individual components. \Remember that all models are wrong; the Thus, we have undertaken a project to build a translator practical question is how wrong do they have to from LLVM to the applicative subset of Common Lisp ac- be to not be useful." [2] { George Box, British cepted by the ACL2 theorem prover. Our translator pro- Statistician duces executable ACL2 specifications featuring tail recur- sion, as well as in-place updates via ACL2's single-threaded Layered assurance for software often requires the creation object (stobj) mechanism. This allows us to efficiently sup- of a library of assured software component models, start- port validation of our models by executing production tests ing with code that lacks a formal pedigree. These assured for the original artifacts against those models. Unfortu- components can then be assembled into subsystems whose nately, features that make a formal model executable are of- top-level assurance relies on the assurance of the individual ten at odds with efficient reasoning.
    [Show full text]
  • Emacspeak — the Complete Audio Desktop User Manual
    Emacspeak | The Complete Audio Desktop User Manual T. V. Raman Last Updated: 19 November 2016 Copyright c 1994{2016 T. V. Raman. All Rights Reserved. Permission is granted to make and distribute verbatim copies of this manual without charge provided the copyright notice and this permission notice are preserved on all copies. Short Contents Emacspeak :::::::::::::::::::::::::::::::::::::::::::::: 1 1 Copyright ::::::::::::::::::::::::::::::::::::::::::: 2 2 Announcing Emacspeak Manual 2nd Edition As An Open Source Project ::::::::::::::::::::::::::::::::::::::::::::: 3 3 Background :::::::::::::::::::::::::::::::::::::::::: 4 4 Introduction ::::::::::::::::::::::::::::::::::::::::: 6 5 Installation Instructions :::::::::::::::::::::::::::::::: 7 6 Basic Usage. ::::::::::::::::::::::::::::::::::::::::: 9 7 The Emacspeak Audio Desktop. :::::::::::::::::::::::: 19 8 Voice Lock :::::::::::::::::::::::::::::::::::::::::: 22 9 Using Online Help With Emacspeak. :::::::::::::::::::: 24 10 Emacs Packages. ::::::::::::::::::::::::::::::::::::: 26 11 Running Terminal Based Applications. ::::::::::::::::::: 45 12 Emacspeak Commands And Options::::::::::::::::::::: 49 13 Emacspeak Keyboard Commands. :::::::::::::::::::::: 361 14 TTS Servers ::::::::::::::::::::::::::::::::::::::: 362 15 Acknowledgments.::::::::::::::::::::::::::::::::::: 366 16 Concept Index :::::::::::::::::::::::::::::::::::::: 367 17 Key Index ::::::::::::::::::::::::::::::::::::::::: 368 Table of Contents Emacspeak :::::::::::::::::::::::::::::::::::::::::: 1 1 Copyright :::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Automated IT Service Fault Diagnosis Based on Event Correlation Techniques
    Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Automated IT Service Fault Diagnosis Based on Event Correlation Techniques Dissertation an der Fakultat¨ fur¨ Mathematik, Informatik und Statistik der Ludwig-Maximilians-Universitat¨ Munchen¨ vorgelegt von Andreas Hanemann Tag der Einreichung: 22. Mai 2007 Tag der m¨undlichen Pr¨ufung: 19. Juli 2007 1. Berichterstatter: Professor Dr. Heinz-Gerd Hegering, Ludwig-Maximilians-Universit¨at M¨unchen 2. Berichterstatterin: Professor Dr. Gabrijela Dreo Rodosek, Universit¨at der Bundeswehr M¨unchen Acknowledgments This thesis has been written as part of my work as a researcher at the Leib- niz Supercomputing Center (Leibniz-Rechenzentrum, LRZ) of the Bavarian Academy of Sciences and Humanities which was funded by the German Re- search Network (DFN-Verein) as well as in cooperation with the research group of Prof. Dr. Heinz-Gerd Hegering. Apart from the LRZ, this research group called MNM-Team (Munich Network Management Team) is located at the University of Munich (LMU), the Munich University of Technology (TUM) and the University of Federal Armed Forces in Munich. At first, I would like to thank my doctoral advisor Prof. Dr. Heinz-Gerd Hegering for his constant support and helpful advice during the whole prepa- ration time of this thesis. I would also like to express my special gratefulness to my second advisor, Prof.
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Linux Administrators Security Guide LASG - 0.1.1
    Linux Administrators Security Guide LASG - 0.1.1 By Kurt Seifried ([email protected]) copyright 1999, All rights reserved. Available at: https://www.seifried.org/lasg/. This document is free for most non commercial uses, the license follows the table of contents, please read it if you have any concerns. If you have any questions email [email protected]. A mailing list is available, send an email to [email protected], with "subscribe lasg-announce" in the body (no quotes) and you will be automatically added. 1 Table of contents License Preface Forward by the author Contributing What this guide is and isn't How to determine what to secure and how to secure it Safe installation of Linux Choosing your install media It ain't over 'til... General concepts, server verses workstations, etc Physical / Boot security Physical access The computer BIOS LILO The Linux kernel Upgrading and compiling the kernel Kernel versions Administrative tools Access Telnet SSH LSH REXEC NSH Slush SSL Telnet Fsh secsh Local YaST sudo Super Remote Webmin Linuxconf COAS 2 System Files /etc/passwd /etc/shadow /etc/groups /etc/gshadow /etc/login.defs /etc/shells /etc/securetty Log files and other forms of monitoring General log security sysklogd / klogd secure-syslog next generation syslog Log monitoring logcheck colorlogs WOTS swatch Kernel logging auditd Shell logging bash Shadow passwords Cracking passwords John the ripper Crack Saltine cracker VCU PAM Software Management RPM dpkg tarballs / tgz Checking file integrity RPM dpkg PGP MD5 Automatic
    [Show full text]
  • Multimedia Systems DCAP303
    Multimedia Systems DCAP303 MULTIMEDIA SYSTEMS Copyright © 2013 Rajneesh Agrawal All rights reserved Produced & Printed by EXCEL BOOKS PRIVATE LIMITED A-45, Naraina, Phase-I, New Delhi-110028 for Lovely Professional University Phagwara CONTENTS Unit 1: Multimedia 1 Unit 2: Text 15 Unit 3: Sound 38 Unit 4: Image 60 Unit 5: Video 102 Unit 6: Hardware 130 Unit 7: Multimedia Software Tools 165 Unit 8: Fundamental of Animations 178 Unit 9: Working with Animation 197 Unit 10: 3D Modelling and Animation Tools 213 Unit 11: Compression 233 Unit 12: Image Format 247 Unit 13: Multimedia Tools for WWW 266 Unit 14: Designing for World Wide Web 279 SYLLABUS Multimedia Systems Objectives: To impart the skills needed to develop multimedia applications. Students will learn: z how to combine different media on a web application, z various audio and video formats, z multimedia software tools that helps in developing multimedia application. Sr. No. Topics 1. Multimedia: Meaning and its usage, Stages of a Multimedia Project & Multimedia Skills required in a team 2. Text: Fonts & Faces, Using Text in Multimedia, Font Editing & Design Tools, Hypermedia & Hypertext. 3. Sound: Multimedia System Sounds, Digital Audio, MIDI Audio, Audio File Formats, MIDI vs Digital Audio, Audio CD Playback. Audio Recording. Voice Recognition & Response. 4. Images: Still Images – Bitmaps, Vector Drawing, 3D Drawing & rendering, Natural Light & Colors, Computerized Colors, Color Palletes, Image File Formats, Macintosh & Windows Formats, Cross – Platform format. 5. Animation: Principle of Animations. Animation Techniques, Animation File Formats. 6. Video: How Video Works, Broadcast Video Standards: NTSC, PAL, SECAM, ATSC DTV, Analog Video, Digital Video, Digital Video Standards – ATSC, DVB, ISDB, Video recording & Shooting Videos, Video Editing, Optimizing Video files for CD-ROM, Digital display standards.
    [Show full text]
  • A Reference Architecture for Web Servers
    A Reference Architecture for Web Servers Ahmed E. Hassan and Richard C. Holt Software Architecture Group (SWAG) Dept. of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 CANADA +1 (519) 888-4567 x 4671 {aeehassa, holt}@plg.uwaterloo.ca ABSTRACT document increases with the size and the complexity of the software system. Recently, a number of tools have A reference software architecture for a domain defines been developed to decrease this cost by helping to ex- the fundamental components of the domain and the tract the architecture of a software system [7, 16, 20, relations between them. Research has shown the bene- 21]. Using these tools, reverse engineering researchers fits of having a reference architecture for product de- have developed semi-automated processes to extract the velopment, software reuse, and maintenance. Many product’s architecture from available artifacts such as mature domains, such as compilers and operating sys- the product's source code and any available documenta- tems, have well-known reference architectures. tion. In this paper, we present a process to derive a reference The reference architecture [4] for a domain is an archi- architecture for a domain. We used this process to de- tecture template for all the software systems in the do- rive a reference architecture for web servers, which is a main. It defines the fundamental components of the relatively new domain. The paper presents the map- domain and the relations between these components. ping of this reference architecture to the architectures of The architecture for a particular product is an instance three open source web servers: Apache (80KLOC), of the reference architecture.
    [Show full text]
  • Conducting and Optimizing Eclipse Attacks in the Kad Peer-To-Peer Network
    Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network Michael Kohnen, Mike Leske, and Erwin P. Rathgeb University of Duisburg-Essen, Institute for Experimental Mathematics, Ellernstr. 29, 45326 Essen [email protected], [email protected], [email protected] Abstract. The Kad network is a structured P2P network used for file sharing. Research has proved that Sybil and Eclipse attacks have been possible in it until recently. However, the past attacks are prohibited by newly implemented secu- rity measures in the client applications. We present a new attack concept which overcomes the countermeasures and prove its practicability. Furthermore, we analyze the efficiency of our concept and identify the minimally required re- sources. Keywords: P2P security, Sybil attack, Eclipse attack, Kad. 1 Introduction and Related Work P2P networks form an overlay on top of the internet infrastructure. Nodes in a P2P network interact directly with each other, i.e., no central entity is required (at least in case of structured P2P networks). P2P networks have become increasingly popular mainly because file sharing networks use P2P technology. Several studies have shown that P2P traffic is responsible for a large share of the total internet traffic [1, 2]. While file sharing probably accounts for the largest part of the P2P traffic share, also other P2P applications exist which are widely used, e.g., Skype [3] for VoIP or Joost [4] for IPTV. The P2P paradigm is becoming more and more accepted also for professional and commercial applications (e.g., Microsoft Groove [5]), and therefore, P2P technology is one of the key components of the next generation internet.
    [Show full text]
  • Diapositiva 1
    TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos.
    [Show full text]
  • Emacspeak User's Guide
    Emacspeak User's Guide Jennifer Jobst Revision History Revision 1.3 July 24,2002 Revised by: SDS Updated the maintainer of this document to Sharon Snider, corrected links, and converted to HTML Revision 1.2 December 3, 2001 Revised by: JEJ Changed license to GFDL Revision 1.1 November 12, 2001 Revised by: JEJ Revision 1.0 DRAFT October 19, 2001 Revised by: JEJ This document helps Emacspeak users become familiar with Emacs as an audio desktop and provides tutorials on many common tasks and the Emacs applications available to perform those tasks. Emacspeak User's Guide Table of Contents 1. Legal Notice.....................................................................................................................................................1 2. Introduction.....................................................................................................................................................2 2.1. What is Emacspeak?.........................................................................................................................2 2.2. About this tutorial.............................................................................................................................2 3. Before you begin..............................................................................................................................................3 3.1. Getting started with Emacs and Emacspeak.....................................................................................3 3.2. Emacs Command Conventions.........................................................................................................3
    [Show full text]
  • Server: Apache
    Modern Trends in Network Fingerprinting SecTor [11.21.07] Jay Graver Ryan Poppa // Fingerprinting Topics Why, What, Who & How? Tools in action Why Tools Break Tools EOL New Approaches New Tool // Why Fingerprint? WhiteHat needs accurate identification of hosts in a PenTest report BlackHat reconnaissance SysAdmins track down and identify new services or hosts when they appear on their network // What is a Fingerprint? Looking at something common … 192.168.2.187:8004 192.168.2.187 [152] 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d HTTP/1.1 200 OK. 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 63 6c 6f .Connection: clo 73 65 0d 0a 41 6c 6c 6f 77 3a 20 4f 50 54 49 4f se..Allow: OPTIO 4e 53 2c 20 47 45 54 2c 20 48 45 41 44 2c 20 50 NS, GET, HEAD, P 4f 53 54 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e OST..Content‐Len 67 74 68 3a 20 30 0d 0a 44 61 74 65 3a 20 46 72 gth: 0..Date: Fr 69 2c 20 30 32 20 4e 6f 76 20 32 30 30 37 20 32 i, 02 Nov 2007 2 32 3a 32 35 3a 31 38 20 47 4d 54 0d 0a 53 65 72 2:25:18 GMT..Ser 76 65 72 3a 20 6c 69 67 68 74 74 70 64 2f 31 2e ver: lighttpd/1. 34 2e 31 35 0d 0a 0d 0a 4.15...
    [Show full text]