A massive reset of PC's with supernodes leaving in an unknown state would be similar a DDoS attack on their auth servers as their authentication and supernode delegation algorithm would be overwhelmed, especially if the retry/recovery mechanism for existing sessions created a positive feedback loop.
On 8/21/07, Alex Pankratov <[EMAIL PROTECTED]> wrote: > > -----Original Message----- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of zooko > > Sent: Monday, August 20, 2007 1:19 PM > > To: theory and practice of decentralized computer networks > > Subject: [p2p-hackers] what really happened to Skype? > > > > Folks: > > > > This is a fascinating case study, but we don't yet have enough > > information to really learn from it! > > > > http://heartbeat.skype.com/2007/08/what_happened_on_august_16.html > > > [snip] > > > > If anyone can give useful insight into the technical events, that > > would be great. > > I don't really have an insight, leave alone a useful one. Only > a gut feeling, which also seems to be the simplest explanation - > > Their authentication servers were DDoS'd > > This is also a kind of explanation Skype would try to avoid at > all costs. > > Alex > > _______________________________________________ > p2p-hackers mailing list > [email protected] > http://lists.zooko.com/mailman/listinfo/p2p-hackers > -- Michael Slavitch Ottawa Ontario Canada _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
