Depends on how we regard the timeouts. I think in 0.7, since we have
fixed timeouts, it's reasonable to see them as outer limits which will
not be breached unless something is seriously wrong. In which case
either approach below is reasonable. I don't think that the attack given
is a serious one though.

On Thu, Oct 20, 2005 at 02:33:05PM +0100, Theodore Hong wrote:
> Matthew Toseland wrote:
> >2. Coalesce requests with different HTL. If we coalesced with a request
> >with a lower HTL, and it DNFed (or equivalent), try it again at full
> >HTL.
> >
> >Possible attacks and issues:
> >Q1. What if some node has a constant stream of htl=1 requests for a key
> >coming from one node? Coalescing will result in perpetual failure,
> >right?
> 
> How about only coalesce with requests with higher HTL?
> theo
-- 
Matthew J Toseland - toad at amphibian.dyndns.org
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20051020/59539a41/attachment.pgp>

Reply via email to