[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: DDoS attacks via TOR?

On Thu, Nov 06, 2008 at 09:07:16AM +0100, Marco Bonetti wrote:
> On Thu, November 6, 2008 02:42, Ted Smith wrote:
> > In a similar vein, I've heard rumors of DDoS being attempted on hidden
> > service targets. My initial reaction was that this would just DoS the
> > network, but is there any chance I'm wrong?
> You could flood the rendevousz points in order to block the access to an
> hidden service, this type of attack is better described in a document
> which should be online in the tor svn but I cannot find it anymore[1]. I'm
> sorry to be so vague.
> Does anyone have a link to the description of avalaible attacks on the tor
> network?
> ciao
> [1]: it's early in the morning and I haven't taken my dose of caffeine
> yet, don't be too rude :-P

You uncaffeinated clod ;>) (Sorry I was talking to myself, I need more
too.) I think you mean the introduction points. The rendezous point
is chosen by the client, not the hidden server.

Apologies if this isn't what you meant, but you may be thinking of my
paper with Lasse Overlier, "Valet Services: Improving Hidden Servers
with a Personal Touch" from PETS 2006 and available at
http://freehaven.net/anonbib/ or
We discuss precisely that issue there.