First, I'd like to throw in that I've been running different nodes in
a 192.168.x/24 net, and even on the same node (feeding one of them the
127.0.0.1:portnum reference of the other). So I don't think special
casing adresses will work for all cases. I'm sure my setup is in the
minority though...

Oskar Sandberg <oskar at freenetproject.org> writes:

> Personally, I would prefer if we had a general strategy of fighting bad 
> references that worked well enough that we didn't need to worry about 
> special casing those addresses that are "obviously wrong" given TCP and 
> DNS on the general Internet.

That's obviously preferable.

> However, I guess the real question is, how many times to we attempt to 
> contact these bad references before throwing them out? If it is large, 
> then a lot of time and effort is being wasted.

Maybe we're doing it wrong then? A thread waiting for a timeout and a
number of SYN packets should be all that is being wasted. Not
something I'd lose much sleep over. I'm more concerned about somebody
maliciously feeding lots of bad references into the system. Is there
some DDoS potential here (announcing <your-victim>:80)?

-- 
Robbe
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.ng
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20021102/0b2c1388/attachment.pgp>

Reply via email to