Closed GoogleCodeExporter closed 8 years ago
I think it is useful to at least have some basic flood protection in the DHT,
given how vulnerable it is otherwise. Granted, you don't have to be all that
sophisticated to spoof your source IP, but at least a little bit.
How about lifting the ban after 5 minutes unconditionally? if the message rate
is still excessive, it would just re-ban the node. I agree that the limits
should be configurable though.
I don't think the intention is to prolong the ban timer when the message rate
is low, this might be a bug. I will review this code.
Original comment by arvid.no...@gmail.com
on 26 Aug 2014 at 6:06
I've altered the logic to just ban for 5 minutes and then unban it again. I
also made it tolerate larger bursts (50 packets in 10 seconds instead of 20
packets in 5 seconds).
making it configurable in 1.0.x is a bit tricky because the settings structs
would have to change, breaking the ABI. I will make a note in trunk though, to
make it configurable. trunk also makes the settings more extensible without
altering the ABI.
Original comment by arvid.no...@gmail.com
on 28 Aug 2014 at 12:30
Original comment by arvid.no...@gmail.com
on 28 Aug 2014 at 12:31
Original issue reported on code.google.com by
vost...@gmail.com
on 26 Aug 2014 at 8:15