Open FedericoCeratto opened 4 years ago
@arvidn Given your in depth knowledge of the protocol. Are you able to advise or give advice on this.
Is it typically important to make traffic look very authentic, to avoid malicious filtering that could detect the probes and let them through?
I would expect just a simple get_peers
message would be sufficient for the simple case, with a freshly randomized node id and target ID.
Something like this:
d1:ad2:id20:<20-random-bytes>9:info_hash20:<20-random-bytes>1:q9:get_peers1:t2:<2-random-bytes>1:y1:qe
Detecting blocking of https://en.wikipedia.org/wiki/Mainline_DHT could be done with simple UDP tests. Partially related to ooni/probe-engine#47 - the DHT can be used by bittorrent but also other applications.