IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2024/05/08
~dr|z3d
@RN_
@T3s|4
@eyedeekay
@orignal
@postman
%Liorar
%acetone
%ardu
+FreefallHeavens
+H20
+HowardPlayzOfAdmin
+Onn4l7h
+Sh0ck
+Xeha
+bak83
+bpb
+profetikla
+qend-irc2p
+r00tobo_BNC
+romer
+uop23ip
+waffles
+wew
Arch
BubbRubb
C341
Danny
DeltaOreo
FreeB
Irc2PGuest10420
Irc2PGuest27560
Irc2PGuest32123
Irc2PGuest61213
Irc2PGuest61416
Irc2PGuest71617
Irc2PGuest73127
Irc2PGuest85657
Meow
Over
Over1
St1nt
T3s|4_
anontor
cumlord
duck
makoto
maylay
nZDoYBkF_
nilbog
poriori_
pory
r00tobo[2]
shiver_
simprelay
solidx66
thetia
u5657
woodwose
zer0bitz
zzz2
orignal yes I do now
orignal Blinded message
orignal I don't know what's wrong if someone publishes too many introducers?
orignal 2 concerns: size of RI and 2 digits index
dr|z3d orignal: if there's a fixed amount set in the code, and someone's going out of their way to modify the code, chances are they're up to no good.
dr|z3d based on recent attacks, assume the worst.
dr|z3d so I ask again, what's a reasonable amount for decent network connectivity? is there any justification for more than 5?
zzz this whole discusssion is silly, there's no agreement necessary
zzz it's an extensible format. It's not appropriate to put something in the spec that some undefined options are illegal
zzz additionally, when under attack, implementations are free to use whatever heuristics they want to take whatever action they want
zzz that also doesn't belong in the specs
dr|z3d ok, zzz, thanks for the input :)
dr|z3d I'm going to stick with max 5 for now before ban unless I hear a persuasive argument for increasing the toleration.