Depends on how we regard the timeouts. I think in 0.7, since we have fixed timeouts, it's reasonable to see them as outer limits which will not be breached unless something is seriously wrong. In which case either approach below is reasonable. I don't think that the attack given is a serious one though.
On Thu, Oct 20, 2005 at 02:33:05PM +0100, Theodore Hong wrote: > Matthew Toseland wrote: > >2. Coalesce requests with different HTL. If we coalesced with a request > >with a lower HTL, and it DNFed (or equivalent), try it again at full > >HTL. > > > >Possible attacks and issues: > >Q1. What if some node has a constant stream of htl=1 requests for a key > >coming from one node? Coalescing will result in perpetual failure, > >right? > > How about only coalesce with requests with higher HTL? > theo -- Matthew J Toseland - toad at amphibian.dyndns.org Freenet Project Official Codemonkey - http://freenetproject.org/ ICTHUS - Nothing is impossible. Our Boss says so. -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: Digital signature URL: <https://emu.freenetproject.org/pipermail/tech/attachments/20051020/59539a41/attachment.pgp>
