On Fri, Oct 10, 2003 at 06:34:03PM +0100, Toad wrote:
> No it wouldn't. Many requests are made for which the data does not exist
> in the network. By Frost, for example. These would end up visiting every
> node. And an attacker could produce a constant stream of random key
> requests to overload a network using such a crazy algorithm.

Ehm, no. You don't continue until the key is found, you continue until
the request gets routed to a node that that request has already passed,
ie the request loops. 


-- 
Frank v Waveren                                      Fingerprint: 21A7 C7F3
[EMAIL PROTECTED]|stack.nl|dse.nl] ICQ#10074100               1FF3 47FF 545C CB53
Public key: hkp://wwwkeys.pgp.net/[EMAIL PROTECTED]            7BD9 09C0 3AC1 6DF2
_______________________________________________
Devl mailing list
[EMAIL PROTECTED]
http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/devl

Reply via email to