FINDING · DEFENSE
In a DHT-based censorship-resistant name system, poisoning attacks (injecting invalid mappings) are neutralized by requiring signature verification on stored values; eclipse attacks (isolating specific mappings from the network) require replication across multiple DHT nodes. Critically, decentralizing lookups from a single ISP resolver to a DHT shifts query visibility from ISPs to arbitrary peers, requiring per-query encryption keyed to secrets known only to the querying client to limit adversaries to confirmation attacks.
From 2013-wachs-feasibility — On the Feasibility of a Censorship Resistant Decentralized Name System · §4.4 · 2013 · Foundations \& Practice of Security
Implications
- Implement DHT value storage with mandatory signature verification to neutralize poisoning at near-zero cost; replicate each record across multiple DHT nodes to resist eclipse attacks.
- Encrypt DHT queries with per-user secrets (label + zone key) so forwarding peers cannot read query content; apply onion routing over the DHT for full query unlinkability at the cost of added latency.
Tags
Extracted by claude-sonnet-4-6 — review before relying.