On Thu, Aug 07, 2003 at 11:23:07PM +0100, Toad wrote:
> 2. We reject requests after transfers are using more than some
> proportion of our outbound (for example) bandwidth limit.

This is how it would be achieved.

> Attack is a
> little harder: attacker needs bandwidth greater than or equal to this
> proportion of the victim's bwlimit. Insert a single huge file at HTL 0.
> When finished, do it again. Repeat indefinitely.

You can always DOS individual nodes if you have the bandwidth, this 
mechanism is no more vulnerable than what we have now.

Ian.

-- 
Ian Clarke                                                  [EMAIL PROTECTED]
Coordinator, The Freenet Project              http://freenetproject.org/
Weblog                               http://slashdot.org/~sanity/journal

Attachment: pgp00000.pgp
Description: PGP signature

Reply via email to