6155Re: [decentralization] Saaf testimony
- Oct 2, 2002--- Kevin Prichard <decent@...> wrote:
> Just about anything that an author can build into aExcept for: the activity the DoS'ers are trying to
> client can be
> reverse-engineered and added to the DoS code.
So, once resharing of partial file fragments is
widespread, a relatively simple countermeasure
against this particular "slot-depleting" attack
would be to check those downloading from you, to
ensure that they are in fact sharing the segments
they've already received out to others. Perhaps
do this through a proxy, so they don't know it's
If they are, great, they're helping the network.
If they aren't, start to contain the damage they're
attempting: give them only a trickle of data, open
another slot, bias your provisioning towards those
peers who are verifiably resharing.
Perhaps even keep referring third parties to the
malicious node, so that they can independently
discover their unhelpful status, and be generally
known as a mischief-maker.
Do you Yahoo!?
New DSL Internet Access from SBC & Yahoo!
- << Previous post in topic Next post in topic >>