On Tue, Feb 27, 2001 at 07:58:17AM +1100, Revenant wrote:
> Ian Clarke wrote:
> > On Mon, Feb 26, 2001 at 09:34:32PM +0100, LAci wrote:
> > > The system should provide a feature to verify keys without
> > > actually downloading the data. This would be good also so that
> > > verification of keys wouldn't create extra traffic and false
> > > demand for keys.
> > We can't do this, since it would allow people to launch DOS
> > attacks on nodes hosting particular keys.
> > Ian.
>   IIRC, GJ has already written software to do this - he uses it to
> create his "validated URI list".  If people want to DOS certain
> content there's nothing that can stop them doing what he does -
> requesting data then cutting off the download once you start
> receiving.

AFAIK even if a download is aborted, the data will continue to be cached
at intermediate nodes.  If this isn't the case, it is a bug.

Ian.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20010226/0f219c6f/attachment.pgp>

Reply via email to