On Jan 22, 2008 8:25 PM, Matthew Toseland <toad at amphibian.dyndns.org> wrote:
> On Tuesday 22 January 2008 18:40, bbackde at googlemail.com wrote:
> > If Frost receives ALL_DATA_NOT_FOUND, it keeps retrying this index
> > during next board updates.
> > But the current DoS attack uses many ADNF, and together with the
> > backload (days to download backward)
> > it takes ages until a board completes to update.
>
> I thought he was pointing them to a GIF / some evil content he inserted block
> by block...

He lately switched to 'redirects to nowhere'. This is what I get from
the node. >90% ADNF.

> >
> > My question is: what is a good way to re-request keys that got an
> > ADNF? Try it exactly X times,
> > or keep it trying if we request keys for today, but don't try them
> > again if we download messages for
> > previous days, or what? I know, in theory those keys could finally
> > arrive after weeks, so what logic should
> > we use?
>
> Try it at some point in the vague future I suppose was the original idea. You
> could set max retries to 3 and never retry on ADNF, if the messages are
> reasonably expendable.

"if the messages are reasonably expendable." ???

> >
> > bback.
>
> _______________________________________________
> Devl mailing list
> Devl at freenetproject.org
> http://emu.freenetproject.org/cgi-bin/mailman/listinfo/devl
>



-- 
__________________________________________________
GnuPG key:   (0x48DBFA8A)
Keyserver:   pgpkeys.pca.dfn.de
Fingerprint:
477D F057 1BD4 1AE7 8A54 8679 6690 E2EC 48DB FA8A
__________________________________________________

Reply via email to