> -----Original Message----- > From: IPsec [mailto:[email protected]] On Behalf Of Yoav Nir > Sent: Wednesday, December 03, 2014 10:06 AM > To: Valery Smyslov > Cc: ipsec; Graham Bartlett (grbartle) > Subject: Re: [IPsec] Some speculations about puzzles > > I think it’s simpler to keep a short list (a queue actually, but usually with > no > more than 2-5 entries) or <difficulty-level ; secret> pairs. > > Generate a new pair every 10 seconds or whenever the difficulty level needs > to change. Remember all entries for the last 20 seconds. Calculate the cookie > as described in the RFC. > > When receiving a cookie, you try to validate it using all the remembered > secret-difficulty pairs (I guess you check for sufficiently many zeros before > you check for the hash), and let them in if one such pair validated.
You can do it easier than that; encode a 'puzzle id' within the puzzle you send to the client (and which they must send back); that way, you can look up the puzzle you originally asked, and check the answer only against that one. _______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
