-
- Downloads
2005-11-26 jrandom
* Be more explicit about what messages we will handle through a client tunnel, and how we will handle them. This cuts off a set of attacks that an active adversary could mount, though they're probably nonobvious and would require at least some sophistication.
Showing
- history.txt 7 additions, 1 deletionhistory.txt
- router/java/src/net/i2p/router/RouterVersion.java 2 additions, 2 deletionsrouter/java/src/net/i2p/router/RouterVersion.java
- router/java/src/net/i2p/router/tunnel/InboundMessageDistributor.java 38 additions, 3 deletions.../src/net/i2p/router/tunnel/InboundMessageDistributor.java
Please register or sign in to comment