On Fri, Oct 10, 2003 at 06:34:03PM +0100, Toad wrote: > No it wouldn't. Many requests are made for which the data does not exist > in the network. By Frost, for example. These would end up visiting every > node. And an attacker could produce a constant stream of random key > requests to overload a network using such a crazy algorithm.
Ehm, no. You don't continue until the key is found, you continue until the request gets routed to a node that that request has already passed, ie the request loops. -- Frank v Waveren Fingerprint: 21A7 C7F3 [EMAIL PROTECTED]|stack.nl|dse.nl] ICQ#10074100 1FF3 47FF 545C CB53 Public key: hkp://wwwkeys.pgp.net/[EMAIL PROTECTED] 7BD9 09C0 3AC1 6DF2 _______________________________________________ Devl mailing list [EMAIL PROTECTED] http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl