forked from I2P_Developers/i2p.i2p
tunnel ID they listen on and make sure the previous peer doesn't change over time. The worst that a hostile peer could do is create a multiplicative work factor - they send N messages, causing N*#hops in the loop of bandwidth usage. This is identical to the hostile peer simply building a pair of tunnels and sending N messages through them. also added some discussion about the tradeoffs and variations wrt fixed size tunnel messages.