-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > > "After building all of the request messages, they are garlic > > wrapped for the target router and sent out an exploratory tunnel" > > Yes, but how is the exploratory tunnel built? Or does the first > exploratory tunnel have a length of 1 in the case of a node in C > that only knows one node in B?
Right. The first exploratory tunnel built has length 0, which it uses to ask the one peer it knows to participate in a tunnel through. Then it has 1 hop tunnels, and it uses that tunnel endpoint (the peer in B) to contact further peers for longer tunnels. This is one of the reasons why the I2CP listener doesn't start up immediately, so client tunnels can be built with longer exploratory tunnels. Peers in C would probably have 2 or 3 peers in B, maybe more, but maybe not, it depends upon the needs and capabilities of those running them, and on the hidden user's anonymity requirements. =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDT4tcWYfZ3rPnHH0RAru+AJ4vWvtHVM/RQhpdl+J7Z/aqf+r1ywCeKYhn IHPztKndkCjX03Mz+DMl4so= =UWo/ -----END PGP SIGNATURE-----
