On Tuesday 22 January 2008 18:40, bbackde at googlemail.com wrote: > If Frost receives ALL_DATA_NOT_FOUND, it keeps retrying this index > during next board updates. > But the current DoS attack uses many ADNF, and together with the > backload (days to download backward) > it takes ages until a board completes to update.
I thought he was pointing them to a GIF / some evil content he inserted block by block... > > My question is: what is a good way to re-request keys that got an > ADNF? Try it exactly X times, > or keep it trying if we request keys for today, but don't try them > again if we download messages for > previous days, or what? I know, in theory those keys could finally > arrive after weeks, so what logic should > we use? Try it at some point in the vague future I suppose was the original idea. You could set max retries to 3 and never retry on ADNF, if the messages are reasonably expendable. > > bback. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20080122/f156edd6/attachment.pgp>
