[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: flooding attacks to discover hidden services
On 02.01.2007, at 09:34, Paul Syverson wrote:
On Mon, Jan 01, 2007 at 06:22:52PM +0000, Steven Murdoch wrote:
On Tue, Jan 02, 2007 at 01:39:05AM +1100, Wikileaks wrote:
Open an onion connection to the hidden service, asking for echos.
Now flood each router. If the "ping" is overly delayed, the router
is on the hidden path.
This is a special case of the attack described in 5.2 of .
Then it seems a further recommendation for hidden server operations is
to manually specify guard nodes from a set of high traffic nodes.