Search found 18 matches

by eHast
2003-03-09 06:48
Forum: Protocol Alley
Topic: Version Authentication
Replies: 14
Views: 7107

volkris wrote:The only problem is that others will see what you're writing and interpret the wrong way, thinking that open sourcing is inherently insecure.(...)
If they're that stupid, let them. We'll just leave a few pointy sticky laying around and hopefully they'll pick one up and stab themselves to death. ;-)
by eHast
2003-03-08 17:09
Forum: Protocol Alley
Topic: Version Authentication
Replies: 14
Views: 7107

OSS has a lot to do with it. If you have closed source you can use obscurity for this purpose. Although obscurity is never a substitute for security (or authenticity in this case) it's a hell of a lot easier to do. And yet it is very often that a closed source client is hacked before the open sourc...
by eHast
2003-03-08 16:43
Forum: Protocol Alley
Topic: Adding file hashes to the protocol
Replies: 97
Views: 45431

I know people must hate me for this by now ;-), but do check out what the OCN people have done with Tree Hashes and such. (This is what Tiger Tree Hashes are based on.) http://open-content.net/specs/ . There's stuff for detecting partial files and downloading as well. Although that system is designe...
by eHast
2003-03-08 16:35
Forum: Protocol Alley
Topic: BitTorrent
Replies: 24
Views: 14542

Although I dont know exactly what the swarmcasting is, I have seen a sketch of the BitTorrents functionality. And to be honest I cannot see that such function would be of any help in DC++. The reason is that there are not that many transfers that are getting the same files from the same user at the...
by eHast
2003-03-01 16:41
Forum: Protocol Alley
Topic: Version Authentication
Replies: 14
Views: 7107

Version authentication. I really can't think of a way to do this in an OSS program. OSS has nothing to do with it, please don't spread the false impression that it does. OSS has a lot to do with it. If you have closed source you can use obscurity for this purpose. Although obscurity is never a subs...
by eHast
2003-03-01 16:06
Forum: Protocol Alley
Topic: BitTorrent
Replies: 24
Views: 14542

There's also an older program called SwarmCast which does the same thing as BitTorrent (but better). It never got very popular unfortunately.

And the idea to include in DC has been around for a long time. But IMHO the protocol is basically too broken to support such big changes.
by eHast
2003-03-01 15:57
Forum: Protocol Alley
Topic: Adding file hashes to the protocol
Replies: 97
Views: 45431

And how do you propose to search for a hash if they are only generated when you search for them? If someone searches for a hash which filename you haven't seen a search for then the search will fail even if you have the file. So you /need/ to have the hashes precalculated. OTOH it would be clever to...
by eHast
2003-02-24 17:08
Forum: Protocol Alley
Topic: Version Authentication
Replies: 14
Views: 7107

My point was that the problem is much harder than that. The problem is a lot harder than something you can adress with just a good protocol. (Ie network protocol, not authentication protocol.) But if you have ideas please do post them and you can get some input on them.
by eHast
2003-02-24 12:24
Forum: Protocol Alley
Topic: Version Authentication
Replies: 14
Views: 7107

Version authentication. I really can't think of a way to do this in an OSS program. Neither can I recall reading about an established method to do it. Perhaps someone has a good idea though. It's always nice to have a brain puzzle like this to think about in any case. ;-) And just to start off, the ...
by eHast
2003-01-24 18:35
Forum: Protocol Alley
Topic: Adding file hashes to the protocol
Replies: 97
Views: 45431

TigerTree are essentially a special case of Tree Hashes (which can use any hashing algorithm). So you could implement Tree Hashes and then just "throw away" some information and you've got a TT. (If you use the Tiger hashing algo.) BTW the Tree Hash Exchange protocol is described here: http://open-c...
by eHast
2003-01-15 18:14
Forum: Protocol Alley
Topic: File upload/download
Replies: 2
Views: 2441

It's not really an FTP file transfer, but it is rather simple. You can find some documentation here http://sourceforge.net/docman/?group_id=36589 and there are other protocol descriptions available. (Unfortunately there were a lot of links in the old forum.) Basically there is some file stuff first ...
by eHast
2003-01-14 15:04
Forum: Feature Discussion (Archived)
Topic: Download from multiple users
Replies: 14
Views: 11481

True that. I wonder if it should be considered bug or feature. ;-)
by eHast
2003-01-14 15:02
Forum: Feature Discussion (Archived)
Topic: Remote User Agreement or something!
Replies: 8
Views: 4618

Besides, the guys working for "anti-pirat gruppen" in Sweden have legal authority to download the files. (Naturally the owner of the file always has legal rights to download it.) And to make matters even worse I doubt disclaimers like this have any legal authority. Even "shrink wrapped" licenses and...
by eHast
2003-01-14 14:55
Forum: Feature Discussion (Archived)
Topic: Upload Speed Limiting
Replies: 187
Views: 90454

Regarding upload/download limits on high-speed networks. Here in Lund the student network is almost collapsing because of the high load. Last summer the network was connected to Sunet with Gb speeds, and this was the last drop. Some of the network links are now so satuated that you get transfer spee...
by eHast
2003-01-13 16:26
Forum: Feature Discussion (Archived)
Topic: Download from multiple users
Replies: 14
Views: 11481

You can't use more than one slot from a single user. (Well besides in NMDC, but that's a bug.) So it would have to be multiple users. There was a lot of arguments about wether or not such a feature would be good for the DC network as well. Personally I think yes, but I guess the jury is still out on...
by eHast
2003-01-11 16:29
Forum: Protocol Alley
Topic: Question to Arne about original design of DC
Replies: 25
Views: 14114

Heh, yeah it reminds me of one of the funny posts I saw on lichlord. (I think it was one of Arne's too.) It was regarding the lock-key system. It was summarised as:

Server: Hi, I'm stupid
Client: Hi, I'm also stupid
by eHast
2003-01-09 13:44
Forum: Protocol Alley
Topic: Encryption?
Replies: 78
Views: 91797

Oh it's trivial. You just have to encrypt the IP address used in DC and then put some garbage in your IP headers. Unfortunately decryption is a bit hairier. Seriously though. Encryption would be a requirement if you wanted to do a "package bouncing network" which could then make you more or less ano...
by eHast
2003-01-09 10:38
Forum: Protocol Alley
Topic: Encryption?
Replies: 78
Views: 91797

(Jay! I'm back. ;-) First off, I think encryption is a good idea. If for no other reason than a lot of people are paranoid and having an already established encryption scheme will alliviate the demand for 3rd party addons instead. (Creating even more interoperability difficulties.) You mention PK di...