aboutsummaryrefslogtreecommitdiffstats
path: root/p2p/discover/udp_test.go
Commit message (Collapse)AuthorAgeFilesLines
* Manual send of multiple neighbours packets. Test receiving multiple ↵subtly2015-05-141-2/+12
| | | | neighbours packets.
* removed redundant newlines in import blockBas van Kervel2015-05-121-1/+1
|
* replaced several path.* with filepath.* which is platform independentBas van Kervel2015-05-121-2/+2
|
* p2p/discover: new distance metric based on sha3(id)Felix Lange2015-05-061-10/+6
| | | | | | | The previous metric was pubkey1^pubkey2, as specified in the Kademlia paper. We missed that EC public keys are not uniformly distributed. Using the hash of the public keys addresses that. It also makes it a bit harder to generate node IDs that are close to a particular node.
* p2p/discover: track sha3(ID) in NodeFelix Lange2015-04-301-8/+12
|
* p2p/discover: new endpoint formatFelix Lange2015-04-301-28/+53
| | | | | | This commit changes the discovery protocol to use the new "v4" endpoint format, which allows for separate UDP and TCP ports and makes it possible to discover the UDP address after NAT.
* cmd/bootnode, eth, p2p, p2p/discover: use a fancier db designPéter Szilágyi2015-04-241-3/+7
|
* cmd/bootnode, eth, p2p, p2p/discover: clean up the seeder and mesh into eth.Péter Szilágyi2015-04-241-2/+2
|
* p2p/discovery: fix broken tests due to API updatePéter Szilágyi2015-04-241-1/+1
|
* p2p/discover: implement node bondingFelix Lange2015-04-011-147/+275
| | | | | | | | | | | | | | | | This a fix for an attack vector where the discovery protocol could be used to amplify traffic in a DDOS attack. A malicious actor would send a findnode request with the IP address and UDP port of the target as the source address. The recipient of the findnode packet would then send a neighbors packet (which is 16x the size of findnode) to the victim. Our solution is to require a 'bond' with the sender of findnode. If no bond exists, the findnode packet is not processed. A bond between nodes α and β is created when α replies to a ping from β. This (initial) version of the bonding implementation might still be vulnerable against replay attacks during the expiration time window. We will add stricter source address validation later.
* p2p/discover: map listening port using configured mechanismFelix Lange2015-02-131-7/+7
|
* p2p/discover: deflake UDP testsFelix Lange2015-02-091-55/+107
|
* p2p/discover: add node URL functions, distinguish TCP/UDP portsFelix Lange2015-02-071-5/+8
| | | | | The discovery RPC protocol does not yet distinguish TCP and UDP ports. But it can't hurt to do so in our internal model.
* p2p/discover: add some helper functionsFelix Lange2015-02-061-7/+7
|
* p2p/discover: new package implementing the Node Discovery ProtocolFelix Lange2015-02-061-0/+156