-
Notifications
You must be signed in to change notification settings - Fork 10
Expand file tree
/
Copy pathvulnerabilities.txt
More file actions
33 lines (27 loc) · 1.76 KB
/
vulnerabilities.txt
File metadata and controls
33 lines (27 loc) · 1.76 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
################################################################################
# Vulnerabilities #
# #
# Description: This file describes the vulnerabilities for each stage. #
# #
# Authors: Ming Fang <mingf@cs.cmu.edu>, Yao Zhou <yaozhou@cs.cmu.edu> #
# #
# #
################################################################################
[TOC-1] Table of Contents
--------------------------------------------------------------------------------
[TOC-1] Table of Contents
[CKP-1] Description of Vulnerabilities for Checkpoint 1
[CKP-2] Description of Vulnerabilities for Checkpoint 2
[CKP-1] Description of Vulnerabilities for Checkpoint 1
--------------------------------------------------------------------------------
1.
Currently, we have not implemented timeout and retransmission. If the responding
IHAVE packet were somewhat dropped, the sender would not resent WHOHAS packets.
This may result in some downloading jobs cannot be successfully completed.
[CKP-2] Description of Vulnerabilities for Checkpoint 2
--------------------------------------------------------------------------------
1.
For each peer pair, the providing side could only be able to serve one GET request
at a time. If the sending side send multiple GET requests to the providing side
consecutively, none of chunks could be downloaded entirely since new get packet
will flush the old download connection.