← Back to team overview

p2psp team mailing list archive

Re: CIS of rules (GSoC)

 

Hi all!

Here is new blogpost:
http://shakirov-dev.blogspot.ru/2015/06/the-third-week.html

Also, I want you to test my code please. There is strange errors sometimes.
After monitor is connected, it doesnt receive new chunks from splitter. And
after the trusted peer is connected to team, monitor exclude it from team
for 129 losses. It occurs sometimes, and I can't understand why it's
happening.

Thanks!

2015-06-20 5:05 GMT+05:00 Juan Álvaro Muñoz Naranjo <juanalvaro83@xxxxxxxxx>
:

> FYI:
>
> https://torrentfreak.com/popular-torrents-being-sabotaged-by-ipv6-peer-flood-150619/
>
>
> Le 18 juin 2015 19:41:12 CEST, Ilshat Shakirov <im.shakirov@xxxxxxxxx> a
> écrit :
>>
>> Hi all!
>>
>> Sorry for the delay in the response.
>>
>> -On replacing CRC32 for SHA-256. ...
>>>
>> Ok, thanks for the explanation.
>>
>> Overriding sendto() function ...
>>>
>> Thanks =)
>>
>> -Packet verification frequency (the 255 problem).
>>>
>> Ok, I will do it as you described.
>>
>> -Malicious peers sending packets even after expelled. ...
>>>
>> I will return to this task after implementing the first steps in
>> STrPe-DS.
>>
>> Regarding testing crypto-libs:
>> I have performed that tests, here is results:
>>
>>> MacBookPro-Ilya-Shakirov:crypto-test i.shakirov$ ./test-ecdsa.py
>>> key.sign x100 times: 2.76373291016s
>>> key.verify x100 times: 5.61430811882s
>>> MacBookPro-Ilya-Shakirov:crypto-test i.shakirov$ ./test-pycrypto.py
>>> key.sign x100 times: 0.0404751300812s
>>> key.verify x100 times: 0.038027048111s
>>>
>> My laptop config is i7 2.9GHz; 8Gb RAM;
>> Source of this synth-tests can be found here:
>> https://github.com/ishakirov/p2psp/commit/d833589ffc5a9a923123c56a74bc0bba2a79c97a
>>
>> I think that pycrypto lib is suitable for our needs in speed. So Im
>> planning to use it in STrPe-DS implementation.
>>
>> PS. Sorry for 3rd week blogpost, but I think there is too small results
>> to write blogpost. But 4th week blogspot will be. =)
>>
>> Thanks!
>>
>>
>> 2015-06-15 11:19 GMT+05:00 Vicente Gonzalez <
>> vicente.gonzalez.ruiz@xxxxxxxxx>:
>>
>>> Hi everybody!
>>>
>>> Just a little remark to this long but insightful message (thanks Juan
>>> Alvaro).
>>>
>>> First, yes, using DS should be the definitive solution, but, regarding
>>> this:
>>>
>>> On Sun, Jun 14, 2015 at 9:04 PM Juan Álvaro Muñoz Naranjo <
>>> juanalvaro83@xxxxxxxxx> wrote:
>>>
>>>  all peers behind the same public IP (NAT scenario) will be banned if
>>>> one of them is malicious
>>>>
>>>
>>> It the EMS set of rules is implemented, more than one peer can be in the
>>> same private network and all are different for the splitter.
>>>
>>> Cheers,
>>> Vi.
>>> --
>>> --
>>> Vicente González Ruiz
>>> Depto de Informática
>>> Escuela Técnica Superior de Ingeniería
>>> Universidad de Almería
>>>
>>> Carretera Sacramento S/N
>>> 04120, La Cañada de San Urbano
>>> Almería, España
>>>
>>> e-mail: vruiz@xxxxxx
>>> http://www.ual.es/~vruiz
>>> tel: +34 950 015711
>>> fax: +34 950 015486
>>>
>>> --
>>> Mailing list: https://launchpad.net/~p2psp
>>> Post to     : p2psp@xxxxxxxxxxxxxxxxxxx
>>> Unsubscribe : https://launchpad.net/~p2psp
>>> More help   : https://help.launchpad.net/ListHelp
>>>
>>>
>>
> --
> Enviado desde mi teléfono con K-9 Mail.
>

Follow ups

References