Changes between Initial Version and Version 1 of Ticket #2425


Ignore:
Timestamp:
2015-05-16T16:37:22Z (10 years ago)
Author:
daira
Comment:

I changed the term "malicious" in the description to "unreliable". Whether a party is malicious is a matter of intent, not observable behaviour; what we actually care about (and can detect) is the latter.

Legend:

Unmodified
Added
Removed
Modified
  • Ticket #2425 – Description

    initial v1  
    1 An important development to keep a network clean from sybil and malicious attacs it's a way to blacklist and detect malicious storage nodes
     1An important development to keep a network clean from pseudospoofing ("Sybil") and malicious attacks is a way to detect and blacklist unreliable or malicious storage nodes
    22
    3 A malicious storage node it's defined like a node that it's saying that it's storing data, but it isn't.
     3An unreliable storage node is defined as a node that says it's storing data, but it isn't.
    44
    5 Those parts of files that it's reciving, are lost.
     5Those parts of files that it's receiving, are lost.
    66
    7 To prevent malicious storage nodes, each client will check file integrity to be sure files are accessible.
     7To prevent use of unreliable storage nodes, each client will check file integrity to be sure files are accessible.
    88
    9 Client keeps a relation of parts uploaded to each node. When a storage node where file were alocated there, is not giving the file, or it's answering it doesn't have your file or is not online, after few retries in different days this node it's marked as malicious.
     9Client keeps a relation of parts uploaded to each node. When a storage node where file were allocated there, is not giving the file, or answers that it doesn't have your file or is not online, after few retries in different days this node is marked as unreliable.
    1010
    11 Each client will have a list of what he detected as a malicious storage node.
     11Each client will have a list of what he detected as an unreliable storage node.
    1212
    13 Those list can be done in the introducer,too. In this way, introducer would prevent to notice about a malicious storage node to possible clients.
     13Those list can be done in the introducer, too. In this way, introducer would prevent to notice about an unreliable storage node to possible clients.