[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #16052 [Tor]: Hidden service socket exhaustion by opening many connections



#16052: Hidden service socket exhaustion by opening many connections
------------------------+------------------------------------------
     Reporter:  asn     |      Owner:
         Type:  defect  |     Status:  new
     Priority:  normal  |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  tor-hs dos SponsorR SponsorU
Actual Points:          |  Parent ID:
       Points:          |
------------------------+------------------------------------------

Comment (by TvdW):

 In general DoSes and DDoSes can be mitigated by making sure the server has
 more capacity than the client. From these follow my two suggestions :

  * Donncha's summer of privacy project (to allow load balancing HSes)
 would allow server owners to just add more servers to the HS.
  * Introducing a Hashcash (proof-of-work) based system into HS connections
 should significantly decrease client capacity. This would ensure that the
 attacker needs significantly more hardware than the HS hoster. Of course
 it's important that the hashcash settings are tunable.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16052#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs