[10924] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Shortcut digital signature verification failure

daemon@ATHENA.MIT.EDU (Bill Frantz)
Sat Jun 22 13:13:55 2002

In-Reply-To: <3D136E13.CA520B2F@nma.com>
Date: Sat, 22 Jun 2002 11:24:07 -0400
To: Ed Gerck <egerck@nma.com>
From: Bill Frantz <frantz@pwpconsult.com>
Cc: cryptography@wasabisystems.com

At 2:18 PM -0400 6/21/02, Ed Gerck wrote:
>A DoS would not pitch one client against one server. A distributed attack
>using several clients could overcome any single server advantage.  A
>scalable strategy would be a queue system for distributing load to
>a pool of servers and a rating system for early rejection of repeated
>bad queries from a source. The rating system would reset the source rating
>after a pre-defined time, much like anti-congestion mechanisms on the Net.
>Fast rejection of bogus signatures would help, but not alone.

I had already thought of this approach, but wanted to add to it a CPU limit
on the client end.  Hash cash with a server provided problem seems a good
approach there.

Cheers - Bill

-------------------------------------------------------------------------
Bill Frantz           | The principal effect of| Periwinkle -- Consulting
(408)356-8506         | DMCA/CBDTPA is to      | 16345 Englewood Ave.
frantz@pwpconsult.com | prevent fair use.      | Los Gatos, CA 95032, USA



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post