
tunnel ID they listen on and make sure the previous peer doesn't change over time. The worst that a hostile peer could do is create a multiplicative work factor - they send N messages, causing N*#hops in the loop of bandwidth usage. This is identical to the hostile peer simply building a pair of tunnels and sending N messages through them. also added some discussion about the tradeoffs and variations wrt fixed size tunnel messages.
$Id$ the i2p/router/ module is the root of the I2P router, and everything within it is released according to the terms of the I2P license policy. That means everything contained within the i2p/router module is released into the public domain unless otherwise marked. Alternate licenses that may be used include BSD, Cryptix, and MIT.