Matthew Toseland wrote: > There is no request quenching at the moment: if there are > bazillions of requests for a specific key, these will be rerouted according > to failures to produce an exhaustive network search, and when it is found, > the data will be rapidly propagated to all requestors/subscribers.
This is very cool stuff and I'm sorry to be a dick and immediately look for problems, but could ULPRs be used to launch a sort of "flash flood" where the attacker trickles out requests for an unavailable key until the key's ULPR web fills the whole network, then releases the key, flooding it through the network? I realise the data wouldn't travel across every link because of the offer/accept mechanism, but it would still visit every node once, which is a decent multiplier for a DoS attack. Cheers, Michael
