Daniel Cheng <j16sdiz+freenet at gmail.com> wrote: > Is DoS possible under this scheme? > > let's say.... > (1) a attacker introduce lots of "imaginary" nodes. > (just some imaginary location and announcements ...) > (2) put lots of request from these imaginary locations > wait for the passive request propagate to the whole network, > (3) upload the actual content..... > (4) all node will then try to send the content to those "imaginary" nodes, > as these location never exist, all nodes will have to busy routing to > some > non-exist location..
The answer I think is that (2) the subscription should not propagate to the whole network, just to the nodes responsible for those keys. Then (4) the nodes holding those keys (not 'all nodes') will send to the imaginary nodes. That's ok, it's no worse than if you were to request a key and then immediately disconnect. theo