论文标题
心脏的全食 - 破坏行星际文件系统
Total Eclipse of the Heart -- Disrupting the InterPlanetary File System
论文作者
论文摘要
点对点网络是多个应用领域的经典客户端服务器架构的有吸引力的替代品,例如配音范围内的IP电话和文件共享。最近,一种称为行星际文件系统(IPFS)的新的点对点解决方案引起了人们的注意,该解决方案有望重新缩小网络。 IPF越来越多地用作独立应用,也已成为其他各种分散解决方案的技术骨干,甚至被用来逃避审查制度。为数百万用户提供服务的分散应用程序依靠IPF作为其关键构建块之一。这种受欢迎程度使IPFS对大规模攻击有吸引力。我们已经在IPFS的一个核心库中确定了一个概念问题,并通过成功的端到端攻击来展示其剥削。我们评估了对公共IPFS网络上IPFS参考实现的攻击,普通用户使用该攻击来共享和消费IPFS内容。通过对实时IPFS节点进行这种攻击获得的结果表明,任意IPFS节点可以被黯然失色,即与网络隔离,以中等的努力和有限的资源来隔离。与类似的作品相比,我们表明我们的攻击量表甚至超出了当前网络大小,并且可以以惊人的努力破坏整个公共IPFS网络。本文所述的漏洞集已分配给CVE-2020-10937。当前正在执行负责任的披露程序,并导致部署缓解,并在将来的发行版中推出其他解决方案。
Peer-to-peer networks are an attractive alternative to classical client-server architectures in several fields of application such as voice-over-IP telephony and file sharing. Recently, a new peer-to-peer solution called the InterPlanetary File System (IPFS) has attracted attention, which promises to re-decentralise the Web. Being increasingly used as a stand-alone application, IPFS has also emerged as the technical backbone of various other decentralised solutions and was even used to evade censorship. Decentralised applications serving millions of users rely on IPFS as one of their crucial building blocks. This popularity makes IPFS attractive for large-scale attacks. We have identified a conceptual issue in one of IPFS's core libraries and demonstrate their exploitation by means of a successful end-to-end attack. We evaluated this attack against the IPFS reference implementation on the public IPFS network, which is used by the average user to share and consume IPFS content. Results obtained from mounting this attack on live IPFS nodes show that arbitrary IPFS nodes can be eclipsed, i.e. isolated from the network, with moderate effort and limited resources. Compared to similar works, we show that our attack scales linearly even beyond current network sizes and can disrupt the entire public IPFS network with alarmingly low effort. The vulnerability set described in this paper has been assigned CVE-2020-10937. Responsible disclosure procedures are currently being carried out and have led to mitigations being deployed, with additional fixes to be rolled out in future releases.