On Mon, Jun 18, 2001 at 01:10:51PM -0700, Mr. Bad wrote: > IC> This is even a viable attack, since a > IC> node could always set itself as the datasource on all > IC> messages, creating a positive feedback loop (more references > IC> in the datastore lead to still more references in the > IC> datastore). > > And the attack would be... what? That the node is providing your node > with valid data? That's an -attack-? Where does the actually-doing-damage > part come in?
You can filter out parts of the keyspace. So long as you server %95 of the keyspace and only silently block, say, %5 of the requests nodes will still reference you (almost everything works, therefore lots of references added to you) and still cause a lot of damage. 'Course that can be overcome by simply running virtual servers. Lots of 'em. -- Need some Linux help or custom C(++) programming? Drop me a line and I'll see what I can do. Resume at http://retep.tripod.com/resume.html GCS d s+:-- a--- C++++ UL++++ P L+++ E W++ N- o K- w-- O- M V- PS+ PE+ Y+ PGP+++ t 5 X R+ tv-- b+ DI+ D++ G e- h! r-- y-- pete at petertodd.ca http://www.petertodd.ca -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 232 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20010618/2c23335b/attachment.pgp>