[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: flooding attacks to discover hidden services

On 02.01.2007, at 09:34, Paul Syverson wrote:

On Mon, Jan 01, 2007 at 06:22:52PM +0000, Steven Murdoch wrote:
On Tue, Jan 02, 2007 at 01:39:05AM +1100, Wikileaks wrote:
Open an onion connection to the hidden service, asking for echos.
Now  flood each router. If the "ping" is overly delayed, the router
is on the hidden  path.

This is a special case of the attack described in 5.2 of [1].

Then it seems a further recommendation for hidden server operations is
to manually specify guard nodes from a set of high traffic nodes.