Mr.Bad (Mon, Jun 18, 2001 at 01:10:51PM -0700):
> >>>>> "IC" == Ian Clarke <ian at hawk.freenetproject.org> writes:
> 
>     >>  How can you possibly know this, Ian? What makes you think this
>     >> is true at all?
> 
>     IC> Because people are reporting that their datastores tend to
>     IC> have one or two nodes to which almost all references are
>     IC> pointing to.
> 
> See my explanation on chat.
> 
>     IC> Only one reference to each node is permitted in the datastore.
>     >>  You have really got to be joking. WHAT?
> 
>     IC> This is even a viable attack, since a
>     IC> node could always set itself as the datasource on all
>     IC> messages, creating a positive feedback loop (more references
>     IC> in the datastore lead to still more references in the
>     IC> datastore). 
> 
> And the attack would be... what? That the node is providing your node
> with valid data? That's an -attack-? Where does the actually-doing-damage
> part come in?

as ubernode, create a routing-key -> complete key database from a keyindex, and
you should be able to learn a lot about the undernode.

since you know which keyspace the undernode is ``responsible for'', you should
be able to recognize if the undernode is the initial requestor (routing-key
different from ``keyspace'')

> ~Mr. Bad

-- 
moritz

.------------------------------+------------------------+----------------------.
|    mailto:moritz at 1723.net    |    http://1723.net/    |    ICQ: 110110488  
  |
|------------------------------+------------------------+----------------------|
| this  mail is  irevocably placed  in the  public domain  and  may be  read,  |
| redistributed    and   erased    freely,    now    and    forever,    amen.  |
?------------------------------------------------------------------------------?

_______________________________________________
Devl mailing list
Devl at freenetproject.org
http://lists.freenetproject.org/mailman/listinfo/devl

Reply via email to