-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/19/2012 04:10 PM, Matthew Toseland wrote:
> However, DoS protection should be a little stronger than has been 
> discussed: You should limit the average number of probes on a
> given link per unit time, like we do with swapping. This should
> probably be an average, and should be generous enough that it isn't
> going to be violated by accident, but it's preferable to having a
> limit on in-flight probes, as it will quench any flood more or less
> at source, and the attacker will be limited by the number of 
> connections he has (at least on darknet, connections are 
> expensive).

The number of probes accepted per peer is limited with a counter which
increments when a request is accepted, decrements 60 seconds later,
and has a maximum (currently 10) above which no more requests are
accepted from that peer. Is my understanding correct that this is an
acceptable way to implement per-link limits?
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=QUS9
-----END PGP SIGNATURE-----

Reply via email to