View Single Post
  #1 (permalink)  
Old May 22nd, 2016
Lucio Lucio is offline
Valued Member contributor
 
Join Date: May 18th, 2016
Posts: 5
Lucio is a great assister to others; your light through the dark tunnel
Default Fake poisoning servents

I am running gtk-gnutella 1.1.9 as ultrappeer (UP) under Linux. I enjoy keeping an eye on Gnutella network. During March-May 2016 I noticed my UP cache approaching 0 servents and the number of UP connections very low (around 10/50).
At first I thought about issues with my internet provider doing some sort of filtering so that I could not connect or receive connections from other UPs. Lately I noticed that my servent was connecting to some strange servents with vendor string "PyGnutella/0.1". I did some research and found out that PyGnutella is an old and unmaintained Python library for Gnutella, not a working client. Then I noticed that all these PyGnutella connections were coming from a single group of IP addresses: 154.45.216.* (see screenshots). These servents had a very low uptime and kept connecting and disconnecting.
One day these PyGnutella servents were no longer in my network connections list and suddenly the number of UP connections was again higher and my UP cache filling up again.
I suppose that these PyGnutella are fake servents who try to disrupt Gnutella functioning, performing a sort of "cache poisoning attack".
Any idea?
Attached Thumbnails
Fake poisoning servents-screenshot-11052016-22-43-40.jpg   Fake poisoning servents-screenshot-15052016-11-07-39.jpg  
Reply With Quote