I'm investigating the applicability of the IETF's DDoS Open Threat
Signaling (DOTS) specifications[1] to the needs of privacy-preserving
overlay networks, including VPNs but with particular interest in Tor.
Specifically, now that the July 2022 D/DoS attack has finally come to a
close, I'm wondering about:
1. the history, frequency, and magnitude of D/DoS attacks against the
Tor network;
2. when these have taken the form of Tor traffic versus lower-level
attacks on Tor nodes and HSDirs; and
3. how the new "proof of work over introduction circuits" scheme fits
into Tor's overall strategy for mitigating D/DoS attacks.
I've found plenty of current and historical GitLab tickets---but I'm
wondering if there are more comprehensive documents or other resources
I'm not aware of.
--- cfm[2].
[1]: https://datatracker.ietf.org/wg/dots/documents/
[2]: I'm a maintainer of the SecureDrop project at the Freedom of the
Press Foundation, but this work is supported by ARTICLE 19's
Internet of Rights Fellowship.
Attachment:
signature.asc
Description: PGP signature
_______________________________________________ tor-project mailing list tor-project@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project