Open
Description
(I wrote about this long ago in a matrix room, but someone reminded me to record it here.)
Would be nice to specifically record the possible attack scenarios and how pinecone handles, planned to handle, should handle or fail to handle them. Possibly it is an useful detail whether something depends on the protocol itself, or on an implementation detail which SHOULD be considered and specified.
Suggestions:
- single point flood (DoS)
- distributed flood (DDoS)
- abusive connections to the network
- deliberate/repeated splitting, joining
- nodes dropping, corrupting traffic (especially bootstrap)
(Some or all could be invalid or already described; some of them indeed are described in the wiki but isn't centrally collected. And possibly many more should be added.)
Metadata
Metadata
Assignees
Labels
No labels