On Tuesday 22 January 2008 19:41, bbackde at googlemail.com wrote: > On Jan 22, 2008 8:25 PM, Matthew Toseland <toad at amphibian.dyndns.org> > wrote: > > On Tuesday 22 January 2008 18:40, bbackde at googlemail.com wrote: > > > If Frost receives ALL_DATA_NOT_FOUND, it keeps retrying this index > > > during next board updates. > > > But the current DoS attack uses many ADNF, and together with the > > > backload (days to download backward) > > > it takes ages until a board completes to update. > > > > I thought he was pointing them to a GIF / some evil content he inserted block > > by block... > > He lately switched to 'redirects to nowhere'. This is what I get from > the node. >90% ADNF.
That's interesting, it means he hasn't yet figured out how to redirect each post to a single key within a target splitfile - or he doesn't want to fill up our datastores with any specific content. > > > > > > My question is: what is a good way to re-request keys that got an > > > ADNF? Try it exactly X times, > > > or keep it trying if we request keys for today, but don't try them > > > again if we download messages for > > > previous days, or what? I know, in theory those keys could finally > > > arrive after weeks, so what logic should > > > we use? > > > > Try it at some point in the vague future I suppose was the original idea. You > > could set max retries to 3 and never retry on ADNF, if the messages are > > reasonably expendable. > > "if the messages are reasonably expendable." ??? Plainly retrying slightly increases the chances of fetching a valid message. It's a tradeoff. > > > > bback. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20080122/76297781/attachment.pgp>
