On Mon, Jun 18, 2001 at 01:10:51PM -0700, Mr. Bad wrote:
>     IC> This is even a viable attack, since a
>     IC> node could always set itself as the datasource on all
>     IC> messages, creating a positive feedback loop (more references
>     IC> in the datastore lead to still more references in the
>     IC> datastore). 
> 
> And the attack would be... what? That the node is providing your node
> with valid data? That's an -attack-? Where does the actually-doing-damage
> part come in?

You can filter out parts of the keyspace. So long as you server %95 of
the keyspace and only silently block, say, %5 of the requests nodes
will still reference you (almost everything works, therefore lots of
references added to you) and still cause a lot of damage.

'Course that can be overcome by simply running virtual servers. Lots
of 'em.

-- 
Need some Linux help or custom C(++) programming?  Drop me a line and
I'll see what I can do. Resume at http://retep.tripod.com/resume.html
GCS d s+:-- a--- C++++ UL++++ P L+++ E W++ N- o K- w-- O- M 
V- PS+ PE+ Y+ PGP+++ t 5 X R+ tv-- b+ DI+ D++ G e- h! r-- y--
pete at petertodd.ca http://www.petertodd.ca
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20010618/2c23335b/attachment.pgp>

Reply via email to