Matthew Toseland wrote:
> There is no request quenching at the moment: if there are 
> bazillions of requests for a specific key, these will be rerouted according 
> to failures to produce an exhaustive network search, and when it is found, 
> the data will be rapidly propagated to all requestors/subscribers.

This is very cool stuff and I'm sorry to be a dick and immediately look 
for problems, but could ULPRs be used to launch a sort of "flash flood" 
where the attacker trickles out requests for an unavailable key until 
the key's ULPR web fills the whole network, then releases the key, 
flooding it through the network?

I realise the data wouldn't travel across every link because of the 
offer/accept mechanism, but it would still visit every node once, which 
is a decent multiplier for a DoS attack.

Cheers,
Michael

Reply via email to