[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] DoSer is back, Tor dev's please consider



On 22 Mar (23:20:54), tor wrote:
> > Suggestion: DoSCircuitCreationMinConnections=1 be established in consensus
> 
> 
> The man page for the above option says:
> 
> "Minimum threshold of concurrent connections before a client address can be
> flagged as executing a circuit creation DoS. In other words, once a client
> address reaches the circuit rate and has a minimum of NUM concurrent
> connections, a detection is positive. "0" means use the consensus parameter.
> If not defined in the consensus, the value is 3. (Default: 0)"
> 
> Reading this, I get the impression that lowering the value to 1 would
> negatively impact clients behind carrier NAT. Isn't that the case? If we
> only allow 1 concurrent connection per IP, wouldn't that prevent multiple
> users behind a single IP? I would think the same problem would apply to
> lowering DoSConnectionMaxConcurrentCount as well (which I think is currently
> 50 in the consensus, but I've seen suggestions to lower it to 4).
> 
> Am I misunderstanding?

Yes, lowering DoSCircuitCreationMinConnections=1 means that you only need 1
concurrent client TCP connection to start applying the circuit creation DoS
mitigation instead of 3 concurrent. This will thus impact all type of clients
and *especially* hidden services which have many clients. They will open many
circuits in few seconds so making your Guard apply DoS mitigation will make
them sad.

I would strongly suggest to leave it untouched in your option file for now and
let the consensus value being used.

Thanks!
David

-- 
hgJe5VGAkZPnC/W4iPXnCuf1HcG2evYQqVjeb8Ugb4Y=

Attachment: signature.asc
Description: PGP signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays