Daniel Cheng <j16sdiz+freenet at gmail.com> wrote:
> Is DoS possible under this scheme?
>
> let's say....
>  (1) a attacker introduce lots of "imaginary" nodes.
>         (just some imaginary location and announcements ...)
>  (2) put lots of request from these imaginary locations
>      wait for the passive request propagate to the whole network,
>  (3) upload the actual content.....
>  (4) all node will then try to send the content to those "imaginary" nodes,
>      as these location never exist, all nodes will have to busy routing to 
> some
>      non-exist location..

The answer I think is that (2) the subscription should not propagate
to the whole network, just to the nodes responsible for those keys.
Then (4) the nodes holding those keys (not 'all nodes') will send to
the imaginary nodes.  That's ok, it's no worse than if you were to
request a key and then immediately disconnect.

theo

Reply via email to