[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #19984 [Core Tor/Tor]: Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS
#19984: Use a better set of comparison/evaluation functions for deciding which
connections to kill when OOS
--------------------------+------------------------------------
Reporter: nickm | Owner: nickm
Type: defect | Status: accepted
Priority: Low | Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: dos, sockets | Actual Points:
Parent ID: | Points: 2
Reviewer: | Sponsor: SponsorV-can
--------------------------+------------------------------------
Comment (by Hello71):
normally, one would use IP reputation to deal with spamming attacks.
however, for obvious reasons, I can see why that might be frowned upon in
these circles.
therefore, some other unfalsifiable proof of work is required. one could
implement a custom proof-of-work protocol, but it seems more useful to me
to measure the bandwidth used. this incurs negligible overhead for
legitimate users, but has the added benefit that attackers are forced to
encrypt their data in order to increase their bandwidth usage.
additionally, if attackers have vastly more bandwidth than you, they can
simply mount a traditional DoS attack anyways.
tl;dr just sort connections by recently used valid data traffic.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19984#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs