On 12/23/2010 5:52 PM, Julian Cain wrote: > On Dec 23, 2010, at 6:33 PM, Matthew Kaufman wrote: > >> On 12/23/2010 10:00 AM, Eugen Leitl wrote: >>> On Thu, Dec 23, 2010 at 09:45:58AM -0800, Alex Pankratov wrote: >>> >>>> Very good question. The bonus question is if the trigger >>>> was "external" and if it involved messing with the actual >>>> (decrypted) Skype protocol messages. >>> Any supernode compromises reported yet, or is this merely >>> a DoS? >>> >> http://blogs.skype.com/en/2010/12/another_status_update_skype_st.html >> (watch the video) confirms that the outage was caused by "a number of" >> clients crashing, and that the cause of that crash was not an external >> malicious attack. > I've build a skype supernode probe utility and it will be run here shortly > this evening. The intent is to determine exactly what versions of skype are > offline by "speaking skype" and asking them for their client software version. Sounds like a plan. If you have the same data from before the outage, it would make for an interesting comparison. > I'm starting with the supernodes that ship within the obfuscated binary > because almost all of these crashed simultaneously from what I've seen in my > own code logs. Were these all/mostly up before the outage? > I don't buy what the skype CEO is saying because first it was very many > supernodes not a few Lots of people are saying that their Windows client crashed last night. If you consider that almost all Internet-connected PCs run Windows it wouldn't be surprising if most Skype-running PCs also run Windows... not to mention the fact that the Windows version is nearly always ahead of the others in features, so might have the latest supernode-capable code in it.
It only needs to be enough to make the network unstable enough that most users think there's an outage, of course. > also these went offline all around the same time and never came back up > however if any are back online my utility will tell me. Well, it is just as hard for a node that had been elected to be a supernode as any other to get back online once a big peer-to-peer overlay goes down... and there's the added complexity this week that (as others have pointed out here) lots of the clients are run by people who are taking the next few days as a holiday. Matthew Kaufman _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers