p2p/discover: implement node bonding
This a fix for an attack vector where the discovery protocol could be used to amplify traffic in a DDOS attack. A malicious actor would send a findnode request with the IP address and UDP port of the target as the source address. The recipient of the findnode packet would then send a neighbors packet (which is 16x the size of findnode) to the victim. Our solution is to require a 'bond' with the sender of findnode. If no bond exists, the findnode packet is not processed. A bond between nodes α and β is created when α replies to a ping from β. This (initial) version of the bonding implementation might still be vulnerable against replay attacks during the expiration time window. We will add stricter source address validation later.
Showing
- p2p/discover/node.go 41 additions, 2 deletionsp2p/discover/node.go
- p2p/discover/table.go 133 additions, 50 deletionsp2p/discover/table.go
- p2p/discover/table_test.go 70 additions, 100 deletionsp2p/discover/table_test.go
- p2p/discover/udp.go 130 additions, 84 deletionsp2p/discover/udp.go
- p2p/discover/udp_test.go 275 additions, 147 deletionsp2p/discover/udp_test.go
Loading
Please register or sign in to comment