[HN Gopher] R5N - Obfuscated mesh routing on hostile networks.
___________________________________________________________________
R5N - Obfuscated mesh routing on hostile networks.
Author : tinydev
Score : 71 points
Date : 2024-08-03 04:30 UTC (4 days ago)
(HTM) web link (lsd.gnunet.org)
(TXT) w3m dump (lsd.gnunet.org)
| orthecreedence wrote:
| I'm curious about two things. I don't really understand how the
| randomized addressing helps with data locality. Is it just saying
| that XOR gives random results, and so adding random hops before
| doing lookups gives a higher statistical percentage of reaching
| nodes?
|
| Also how does this compare to something like libp2p w/ DCUtR for
| NAT traversal? Is the NAT problem circumvented by the randomized
| walk routing?
| grothoff wrote:
| Yes, the random walk relates to the "NAT problem". Basically,
| due to NAT, peers may not succeed when trying to connect to
| arbitrary other peers (especially if you assume no TURN servers
| or other infrastructure to facilitate). The same situation may
| also arise in mobile ad-hoc networks, where your wireless
| signals simply don't get everywhere. As a result, the usual
| greedy routing will get stuck in a local minimal. By prefixing
| the greedy routing with a random walk, you basically randomize
| the starting position, and then end up at a _random_ local
| minima. Replicate at enough local minima (O(sqrt(n)) and do
| enough (O(sqrt(n)) lookups and the birthday paradox will make
| it increasingly likely for you to succeed. Without the random
| walk, both the putter and the getter would greedily route
| always to their local minimum, and if they differ, never find
| each other 's data.
| orthecreedence wrote:
| Awesome, this makes sense, thanks for the explanation.
| samstave wrote:
| I love the way you wrote this.
|
| Can you give some examples fictional scenario where this
| would be put to use as you state it really well.
|
| Thanks
| grothoff wrote:
| On this Internet if you don't trust third parties to route
| all of your traffic through and peers are behind NAT or
| CGNATs. Or imagine a mixed network with some peers on
| https://en.wikipedia.org/wiki/Wireless_ad_hoc_network (s),
| possibly with some connected to the Internet. The key
| assumption we have (for the random walk to work) is that it
| must be a small-world network
| (https://en.wikipedia.org/wiki/Small-world_network) and
| network topologies surprisingly often are.
| jay-barronville wrote:
| Is there an official reference implementation of the protocol
| available?
| grothoff wrote:
| Actually, there are two: One in C at
| https://git.gnunet.org/gnunet.git/tree/src/service/dht And one
| in Go at https://git.gnunet.org/gnunet-go.git/
___________________________________________________________________
(page generated 2024-08-07 23:00 UTC)