Example: Gnutella
Pure peer-to-peer protocol.
Flooding-style topology discovery and queries.
- Leaks information.
- Rogue node in the middle can spy.
- Hard to prevent spoofed addresses; can lead to flooding attacks.
Firewall evasion commands.
(See http://www.research.att.com/~smb/talks/NapsterGnutella/index.htm)