[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #16052 [Tor]: Hidden service socket exhaustion by opening many connections
#16052: Hidden service socket exhaustion by opening many connections
------------------------+------------------------------------------
Reporter: asn | Owner:
Type: defect | Status: new
Priority: normal | Milestone: Tor: 0.2.7.x-final
Component: Tor | Version:
Resolution: | Keywords: tor-hs dos SponsorR SponsorU
Actual Points: | Parent ID:
Points: |
------------------------+------------------------------------------
Comment (by TvdW):
In general DoSes and DDoSes can be mitigated by making sure the server has
more capacity than the client. From these follow my two suggestions :
* Donncha's summer of privacy project (to allow load balancing HSes)
would allow server owners to just add more servers to the HS.
* Introducing a Hashcash (proof-of-work) based system into HS connections
should significantly decrease client capacity. This would ensure that the
attacker needs significantly more hardware than the HS hoster. Of course
it's important that the hashcash settings are tunable.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16052#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs