New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DHT support #57
Comments
why not use libtorrent?, twister uses libtorrent for DHT |
zeronet protocol is different from torrent, so libtorrent will not work. Also bittorrent DHT is UDP based, so it will not work on Tor without proxying it to TCP which I don't want. And it does not support storing Tor hidden service addresses, so you would not be able to create sites on Tor. |
@HelloZeroNet You could add to your first comment:
|
Its already there:
|
@HelloZeroNet Ho, didn't see that, sorry |
Full tor support and hidden services can work inside zeronet by creating a dht (that would be a tor hidden service it self) that holds the .onion addresses and load balances them. In clearnet it could work as a common dht. So its users connecting to zeronet through tor will have a hidden service created for its site he/she visits. And let tor hdirs take care the rest! |
Interesting issue. Zeronet would drastically benefit from a DHT, as trackers tend to come and go with time... My bet is that it would be best to bootstrap and use Bittorrent's DHT (Mainline DHT - MLDHT), as although it has a few problems, a lot of effort is put into it to keep it reliable and stable. A simple approach could be done using For instance I (new user) query the MLDHT : About the dependency, I think it's inevitable, at least for some things like bencode and the MLDHT, although there seems to exists relatively small python libraries. I'll have a look at this. |
Can the DHT solves the problem that how a new client first join the zeronet when the tracker server is down? |
@stillwarter DHT still need a bootstrap server, so it does not help on new "virgin" clients. |
@HelloZeroNet Maybe this https://github.com/maidsafe/routing or this https://github.com/maidsafe/crust can be used. |
Custom bootstrap clients (storing all of them is nice too) , some proxys and an option to save an anonymous list of users to use as emergency bootstrap, it can be stored(exported and imported)! The "unvirginizer" |
Could we use https://github.com/closeio/redis-hashring in Python or https://github.com/RJ/ketama in C? |
Hi, I propose to you to consider using OpenDHT. It has the following features:
I personally would like more projects to join like Syncthing. |
IPv6 for CJDNS would be fantastic. |
I talked with Shortcutme with this issue. Here are the questions he is trying to find an answer to.
Here are my questions:
|
Which DHT protocol do you use ? @HelloZeroNet |
Does ZNet made any progress in this issue? |
New progress made yet. |
this might be of interest. It's not reimplementing DHT using TCP, but instead it just carries the UDP traffic through a TCP tunnel (with the express intent of letting it be carried by Tor) |
Very interested in getting DHT, but in the interim with trackers getting blocked and dropped, maybe you could add more trackers? |
Here is my own implementation of the Pastry DHT algorithm. https://github.com/MuxZeroNet/pastry Pastry basics:
Joining, leaving and repairing the network: The packets you may need to provide:
Edit: Removed "Toy DHT." Added Pastry, which is not a toy. |
We got a new problem:
Yes. In practice, latency is what makes DHT protocols slow, which is one of the reasons DHT protocols run over datagram, but rarely over TCP streams. In Tor, you have to use TCP streams, because this is how Tor works. I2P SAM provides datagram API. Running DHT over I2P has "encryption overhead" and has observable latency, but it is better than nothing. DHT has been used by I2PSnark and BiglyBT for torrents.
I am more on the "implement a DHT that fits ZeroNet's needs" side, while I am not familiar with the API Even if you will be using a DHT library, you should always think about how to write the protocol docs. By using proper means of abstraction, the less you leak implementation details in the specification, the more flexible the protocol is. You really don't want to make future developers who will be implementing ZeroNet in another programming language get stuck on a particular library. |
For a DHT alternative you might want to look at how syncthing implements TCP relays to allow hole punching and communication over Tor. Magic-Wormhole a secure simple file transfer tool is looking to adopt their design to solve scalability. https://docs.syncthing.net/users/strelaysrv.html list of servers: http://relays.syncthing.net/ cc/ @adrelanos |
@HulaHoopWhonix The thing with relay servers, is that you still have a form of centralization: indexation system of IP addresses. If the indexation system is put down, you cannot query the list of IP addresses. Even worst: censorship, mitm and all centralized scheme attacks are possible. When using DHT, a new routing protocol emerges on top of the IP network which is (really) hard to take down and attack once you have passed a certain point in the number of nodes. After you have resolved the hash query, you can exchange with your peer through DHT However, what you speak of makes me think that onion services may be a good fit for syncthing's use case. Each device could host an onion service in the tor network when it's online so that it can exchange ip address with each other. I'm throwing that idea out there, but I don't know a lot about the onion service design... Also, it seems funny to use an anonymizing network to exchange IP address. May be syncthing could even run directly on tor, but I digress from the original subject. |
Any network, including DHT and P2P ones will rely on bootstrap nodes to help them reach the wider network. This is unavoidable. DHT can never be used over Tor and that's why a commonly emerging solution in the Tox project and Syncthing is to rely on some form of federated relays.
You realize that onions don't have IPs? While Tor support in the form of ephemeral services using Txtorcon are a neat addition it still doesn't solve the problem of a Tor user interoperating with the outside zeronet network that runs on on the clearnet. Unless Tor use is enforced by default, you will end up with a fragmented network. |
Yes. However, listing relays on a centralized machine, contrary to using a DHT, doesn't scale.
I didn't say that. However, I assumed the opposite. In fact, onion services use DHT.
As I acknowledged above, bootstrap nodes are needed at first, but you don't need to solely rely on fixed relays over time. Once you're connected to the network, to a DHT for example, you save that list of ip addresses you have contacted, you don't rely on the centralized ip address list and you continuously learn about new nodes through the protocol itself, hence the scaling capability. Opting for centralized relay indexation system implies lacking of scale or reinventing the wheel, like the DHT that is. I'm sure that you know that.
Excuse me. I recognize(d) that I digressed from the subject in the last paragraph of my last post. I was not speaking of a solution for ZeroNet.
What exacly do you imply? Please, can you avoid making sentences in the form of "You realize that [place some supposed well-known fact here]?" They're not clear and tend to be taken with offense. I think I understand what's the concern here. You're thinking that I'm speaking of onion services for ZeroNet, but I'm not. I'm speaking about the case of Syncthing. Onion services are resolved with a distributed hash table lookup if that's what you meant by your sentense above. What I meant is that Syncthing devices could use onion services to exchange their ip address like you'd do in a distributed hash table, except that they'd do it through the tor network in addition to looking up the DHT. That may not be adequate indeed after a second thought. A DHT is sufficient, I guess. I think that we should avoid continuing to speak about Syncthing now as it is not the concern of this issue. |
Please consider retro share. Dark net mode of Retro share let tor or i2p do the peer discovery. It is NOT DHT over TOR.
|
#57 (comment) |
https://github.com/bmuller/kademlia: "The nodes communicate using RPC over UDP to communiate, meaning that it is capable of working behind a NAT." |
How about DHT only without Tor for now? |
@gpestana is very knowledgeable about onion-routing + DHTs, maybe he can help. There are some useful links here: |
hey! ZeroNet is great, good job! 🚀🚀 We at hashmatter are very interested in understanding how different projects are using DHTs and P2P routing protocols and what implication it may have in privacy and metadata leaks - and to try solving privacy vulnerabilities. In the context of ZeroNet, what would be the goal of a DHT? Would it be for service/peer discovery or/and storing and requesting content? How about the latency requirements? In terms of metadata leaks, DHTs may become very problematic and proxying the DHT traffic through Tor may sometimes not be the best solution (depending on the latency requirements, peer identity requirements, etc.) I believe the best way is to define 1) what are the goals for the DHT 2) latency requirements 3) threat model (this might exist somewhere already, and I'm sorry if that's the case and I didn't research enough). There are interesting protocols that can be built on top of the DHT routing protocol (check some here https://github.com/hashmatter/p3lib) that can enhance considerably the privacy of DHT interactions without the need for routing all traffic over Tor. Happy to keep the discussion and helping if needed 👍 |
@gpestana Unless your solution is compatible with Tor, it is not relevant for the goal of this ticket. |
The red herring seems to be the requirement:
Can we generalize this requirement? What are the requirement for Tor? Anonymity? Privacy? So, how can you use DHT in a way that preserves these basic requirements, while not necessarily using Tor and not impeding the ability to use Tor for the rest of ZeroNet's functions? So, when I look at OpenDHT, I wonder to what extent this capability helps meet these core requirements:
|
One of OpenDHTs very nice features is a defined REST API for DHT nodes, which act as gateways to look up keys without actually using the DHT yourself. Why not just switch over to using this mode of access when using TOR, but use the DHT as is when using the clear internet? Trackers can come and go all they want, just switch to another, they all use the same DHT backend. |
One of my blog (zite) visitor complained about there is no peers error but there was 20 peers. The tracker was lying. |
You should use Lokinet instead of Tor it is safer because monetized and it support UDP. Even maybe they can sponsor you |
Similar to torrent's DHT solution, required features:
Maybe its requred to separate the DHT from Peer Exchange
Please comment if you have other ideas/suggestions.
The text was updated successfully, but these errors were encountered: