Received: from sog-mx-2.v43.ch3.sourceforge.com ([172.29.43.192] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1R1lEO-0005UH-Mv for bitcoin-development@lists.sourceforge.net; Thu, 08 Sep 2011 20:29:52 +0000 X-ACL-Warn: Received: from mail-gy0-f175.google.com ([209.85.160.175]) by sog-mx-2.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-MD5:128) (Exim 4.76) id 1R1lEO-00010k-1C for bitcoin-development@lists.sourceforge.net; Thu, 08 Sep 2011 20:29:52 +0000 Received: by gyg8 with SMTP id 8so1031704gyg.34 for ; Thu, 08 Sep 2011 13:29:46 -0700 (PDT) Received: by 10.42.19.132 with SMTP id c4mr474429icb.4.1315509942212; Thu, 08 Sep 2011 12:25:42 -0700 (PDT) MIME-Version: 1.0 Received: by 10.231.199.12 with HTTP; Thu, 8 Sep 2011 12:25:22 -0700 (PDT) In-Reply-To: <201109081315.12643.luke@dashjr.org> References: <201109081315.12643.luke@dashjr.org> From: Will Date: Thu, 8 Sep 2011 20:25:22 +0100 Message-ID: To: Luke-Jr Content-Type: multipart/alternative; boundary=20cf30427198cdd69404ac7306d0 X-Spam-Score: 1.0 (+) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 1.0 HTML_MESSAGE BODY: HTML included in message X-Headers-End: 1R1lEO-00010k-1C Cc: bitcoin-development@lists.sourceforge.net, David Perry Subject: Re: [Bitcoin-development] Alert System X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Sep 2011 20:29:52 -0000 --20cf30427198cdd69404ac7306d0 Content-Type: text/plain; charset=ISO-8859-1 > In fact, I think the alert system should relay (note, NOT display) messages > *regardless of the key used*, so it isn't yet another "our client gets > special > status" thing, and can be used for other clients as well. > > > Be careful though, if you relay everything, it suddenly *does* have DDoS potential... no more than other messages such as transactions. >Maybe require a proof-of-work then? kind of defeats the purpose of the alert if it takes a long time to issue one. I think leave the alert in, but relay alert messages even if they don't use the correct key. This means that if we later decide to add new keys to the alert root trust then older clients will still relay these. my .02btc Will --20cf30427198cdd69404ac7306d0 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
In fact, I think= the alert system should relay (note, NOT display) messages
*regardless of the key used*, so it isn't yet another "our client = gets special
status" thing, and can be used for other clients as well.


>= ; Be careful though, if you relay everything, it suddenly *does* have DDoS = potential...

no more than other messages such as transactions.

>Maybe require a proof-of-work then?

kind of defeats the purp= ose of the alert if it takes a long time to issue one.

I think leave= the alert in, but relay alert messages even if they don't use the corr= ect key.=A0 This means that if we later decide to add new keys to the alert= root trust then older clients will still relay these.

my .02btc

Will
--20cf30427198cdd69404ac7306d0--