[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: SSL attack



-----BEGIN PGP SIGNED MESSAGE-----

From: "Robert A. Rosenberg" <[email protected]>

>I thought that the ACK gives starting location and number of segments. If I
>get 500 segments and ACK at the 50% point I am sending an ACK for the
>Starting Point and 250 Segments (the unprocessed part would then ACK

With multiple heirchical servers, you don't have the same bottleneck 
problems. If you have a random mode that you can switch into, same deal
(if you care to use it). There are a lot of people who want the anonymity
and server-independance of random mode. There are people who don't want
to add another 37% onto the processing time, given the unlikeliness of
a D.O.S. attack on the server. I continue to support the idea of a 
two-pronged attack using both methods.

Given that most of the server bottleneck was un-updated clients anyway,
I think that the bottleneck-on-the-server problem is solved anyway, 
meaning there won't be any problems getting new keys - thus eliminating
the need for a keyspace buffer queue.

Don

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQB1AwUBMEfVssLa+QKZS485AQEV9QMAoue7RyySe1H0a7s6hBkjf7knaXesLY1h
ZQg9rBZ9ZieJ5qWyBHL03Gn4XikSD8U6/MBbiyMvOnz+QTYRQcMxQioEu4YDcFdD
etaful6wYhtXzd/MTn+VWjBf86poDeNK
=Mp2o
-----END PGP SIGNATURE-----
<[email protected]>           fRee cRyPTo!   jOin the hUnt or BE tHe PrEY
PGP key - http://bert.cs.byu.edu/~don     or PubKey servers (0x994b8f39)
  June 7&14, 1995: 1st amendment repealed.  Death threats ALWAYS pgp signed
* This user insured by the Smith, Wesson, & Zimmermann insurance company *