Newsbyte wrote:

Ok, now I know I must be missing something here ;-)
"But then the attacker just needs to account for the fact that you will
try to fake it by fake-route to one other node. So, he discounts the
time he thinks it would take you to real-route (he can measure this by
sending you requests on other nearby keys, and, voila, has the timing
attack back. I think that's what Tom is saying as well."
When he sends nearby keys, the node either has the data in it's store or not; it will use a)time to request it from another node (when it's not in the node), b)take the same time to respond as if he requested it (when it is in the store).
You want all nodes to use that strategy? If all nodes used that strategy, then nothing would ever get done, since no nodes who had the data would ever use option (a). So, the amount of time we would have to wait in (b) would be infinite. The only way I see out of this, is to sometimes (10%? 50%?) respond anyway even when we have the data.

Did I understand you correctly? Before we continue, I gotta make sure we are talking about the same thing.

-Martin


_______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to