Spike Gronim:
>       The boolean ping functionality would be equivalent to requesting a file
> that was just 1 bit in length. And this wouldn't be a passive probe, as the 
> attacker would have to initiate a request. Such an attacker could just ask
> for the file and then break off the transfer to have the same effect, coud he
> not?

The nodes in the chain will cache the data anyway. (Which, by the
way, makes flooding attacks _much_ easier...)

_______________________________________________
freenet-tech mailing list
[EMAIL PROTECTED]
http://lists.freenetproject.org/mailman/listinfo/tech

Reply via email to