[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-dev] Tor and slow DOS attacks



Hi,

today, I read that blog post:

http://www.guerilla-ciso.com/archives/2049

It is talking about the rise of slow DOS attacks and that Tor could play
an important role in it (in fact the post links to an already existing
tool for this attack properly configured to get used with Tor).
As one of the defenses (granted the last one on his list) the author
mentions:

"Block TOR exit nodes before the traffic reaches your webservers (IE, at
layer 3/4)."

Well, as this is not good for the Tor network and makes it unnecessary
easy for censors to argue for blocking Tor ("we just want to defend us
against slow DOS attacks") I am wondering whether there is already some
effort under way to detect and ban such kind of traffic. Or should there
be such effort at all?

Georg

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev