-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> > "After building all of the request messages, they are garlic
> >  wrapped for the target router and sent out an exploratory tunnel"
>
> Yes, but how is the exploratory tunnel built? Or does the first
> exploratory tunnel have a length of 1 in the case of a node in C
> that only knows one node in B?

Right.  The first exploratory tunnel built has length 0, which it
uses to ask the one peer it knows to participate in a tunnel
through.  Then it has 1 hop tunnels, and it uses that tunnel
endpoint (the peer in B) to contact further peers for longer
tunnels.  This is one of the reasons why the I2CP listener doesn't
start up immediately, so client tunnels can be built with
longer exploratory tunnels.

Peers in C would probably have 2 or 3 peers in B, maybe more, but
maybe not, it depends upon the needs and capabilities of those
running them, and on the hidden user's anonymity requirements.

=jr
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDT4tcWYfZ3rPnHH0RAru+AJ4vWvtHVM/RQhpdl+J7Z/aqf+r1ywCeKYhn
IHPztKndkCjX03Mz+DMl4so=
=UWo/
-----END PGP SIGNATURE-----

Reply via email to