On Jan 31, 2008, at 11:57 AM, Michael Rogers wrote:

> (This is a different attacker from the one that wants to occupy a  
> region of
> the key space, BTW - this one's goal is to make you search a large  
> number
> of nonexistent subnets before giving up, and possibly to stop you
> discovering real subnets by flooding your routing table.)

I suppose what would be necessary, then is that a node only forward  
(or.. advertise) network id's from the top-'N'-succeeding networks.  
That would isolate the flood to the attacker's peers, and concentrate  
the spread of useful (big) network id's for routing.

--
Robert Hailey

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20080131/670ce5aa/attachment.html>

Reply via email to