On Thu, Aug 07, 2003 at 11:23:07PM +0100, Toad wrote: > 2. We reject requests after transfers are using more than some > proportion of our outbound (for example) bandwidth limit.
This is how it would be achieved. > Attack is a > little harder: attacker needs bandwidth greater than or equal to this > proportion of the victim's bwlimit. Insert a single huge file at HTL 0. > When finished, do it again. Repeat indefinitely. You can always DOS individual nodes if you have the bandwidth, this mechanism is no more vulnerable than what we have now. Ian. -- Ian Clarke [EMAIL PROTECTED] Coordinator, The Freenet Project http://freenetproject.org/ Weblog http://slashdot.org/~sanity/journal
pgp00000.pgp
Description: PGP signature
