Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Security Analysis of Napster and Gnutella Peer-to-Peer File Sharing Networks, Study notes of Computer Science

An in-depth analysis of the security aspects of napster and gnutella, two popular peer-to-peer file sharing networks. The author, steven m. Bellovin, discusses the common functions of these systems, their protocol details, and the security vulnerabilities and concerns associated with each. Topics covered include topology discovery, query and reply mechanisms, content issues, and ui vulnerabilities.

Typology: Study notes

2009/2010

Uploaded on 03/28/2010

koofers-user-3s5
koofers-user-3s5 🇺🇸

5

(1)

10 documents

1 / 33

Toggle sidebar

Related documents


Partial preview of the text

Download Security Analysis of Napster and Gnutella Peer-to-Peer File Sharing Networks and more Study notes Computer Science in PDF only on Docsity! 1 Security Aspects of Napster and Gnutella Steven M. Bellovin smb@research.att.com http://www.research.att.com/~smb 2 Common Functions Share files. Peer-to-peer – files don’t reside on a central server. Each user decides which files to offer to others. Protocol supplies index and connectivity information. Data transfer is end-to-end, and does not use central server. 5 Gnutella Protocol Details Simple protocol: 5 messages. – Ping, pong, push, query, query hits. Uses “flooding protocol” – speak to all neighbors. HTTP used for actual content transfer. No login, no authentication, no central authority of any type. 6 Gnutella Topology 6 Gnutella Topology 6 Gnutella Topology 7 Common Header 16-byte Windows GUID – Clients must drop messages if GUID seen recently. Message type. Time-to-live (limits maximum spread of message). Hop count – how far away the sender is. Payload length. 8 Ping and Pong Used for topology discovery – ask who’s out there. Nodes that choose to reply with their IP address, plus the amount of data they’re sharing. Provides new connection points for nodes. But what if they lie about their IP address? 11 Gnutella Analysis Gives away topology information. Hard to control via firewalls. Unchecked IP address and port number announcements can be used to generate flooding attacks, and possibly worse. GUID may be usable to trace back Gnutella messages. 12 GUID Tracing On Windows 95, 98, NT, GUID contains the hardware MAC address, which is constant over time. Privacy violation – can be used to link requests over time. Windows 2000 (and the UNIX clients I’ve looked at) use random- appearing GUIDs. – Is there some hidden linkage? 13 Leakage Announces IP addresses. Appears to announce full path names. Announces Gnutella topology, which may (or may not) reflect real-world patterns of association. Can use any port number – hard to detect, hard to control outbound via firewalls. Nosy node can record queries, responses. 16 UI Issues Gnutella can be used to share arbitrary files. Some UIs provide an easy way to open files. Is this mechanism safe? How does it decide how to open a file? If done wrong, this is as dangerous as email attachments. – Can I get a .EXE or a .VBS file when I asked for an MP3? Again, fake line speed announcements can be used to attract clients 17 Napster Protocol Details Complex client/server protocol with central site. Users can register, log in, etc. – Registration message includes age, income, and education… – Central site can bounce users, ban them, etc. Different message groups for chat rooms, searching/browsing, upload/download. File transfer is direct, and doesn’t go through napster.com’s site. 18 Napster Topology napster.com 18 Napster Topology napster.com 18 Napster Topology napster.com 19 Searching and Indexing Client sends search or browse requests to central site. – Can browse some other user’s files. – Response come back from central site. Only explicitly-shared files should be retrievable. Only handles MP3. – “Wrapster” can package other file types in MP3 envelope. 22 UI Issues Less opportunity for auto-exec of nasty programs. – What if Wrapster functionality becomes common? Is browsing more intrusive than query/response? 23 Napster Analysis Much harder for clients to lie – can’t give fake IP addresses, port numbers, etc. Central site can exert much more control. Privacy issues – central site knows (almost) all. Fake content and fake line speed attacks still apply – but in theory, are more traceable. 24 Napster versus Gnutella Napster is more centralized – easier to monitor and control, for good or bad purposes. Gnutella can probably scale further if better topology reconstruction algorithms are developed. Only Gnutella can easily share arbitrary files – but that’s a likely growth direction for Napster. Gnutella is probably the style of the future – avoid central sites.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved