[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #28367 [Core Tor/Tor]: RFE additional DOS mitigations for exits
#28367: RFE additional DOS mitigations for exits
--------------------------+----------------------------------
Reporter: starlight | Owner: (none)
Type: enhancement | Status: closed
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version: Tor: unspecified
Severity: Normal | Resolution: duplicate
Keywords: tor-dos | Actual Points:
Parent ID: #24797 | Points:
Reviewer: | Sponsor:
--------------------------+----------------------------------
Comment (by teor):
Replying to [comment:3 starlight]:
> An obvious objection to ulimit -n as a control is that this is
simplistic with respect to multi-homed systems and may not always result
in resilient behavior. Port limits operate with respect to IP addresses
rather than at global daemon level. If ulimit -n is saturated, it will
not be possible to open new control connections.
You can open new control connections if you set ulimit -n to a level your
system can handle, and also set `DisableOOSCheck 0`:
> > To reduce the number of file handles, use ulimit -n (limit) or the
equivalent daemon launcher option.
> >
> > You may also want to set DisableOOSCheck 0 in your torrc, which causes
tor to terminate connections at around 90% of the limit, rather than
failing.
Replying to [comment:4 starlight]:
> Another point to think about is rate limiting of connections. Scanners
generally operate by extending a number of circuits to an exit and then
rapidly opening streams / edge_connections on each, so an effective way to
mitigate this form of behavior is to have a rate limit that curtails or
kills circuits that rapidly initiate connections while leaving calmer
circuits untouched. The first priority flesh-and-blood users who brows
the web can continue unharassed while bots get squelched.
You're right: we should work out a way of rate-limiting exit connections
as well.
Until we do that, I suggest using a firewall to rate-limit the number of
new outbound connections. It's not as targeted as inbound connections per
IP address, but it will help.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28367#comment:5>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs