Hi, today, I read that blog post: http://www.guerilla-ciso.com/archives/2049 It is talking about the rise of slow DOS attacks and that Tor could play an important role in it (in fact the post links to an already existing tool for this attack properly configured to get used with Tor). As one of the defenses (granted the last one on his list) the author mentions: "Block TOR exit nodes before the traffic reaches your webservers (IE, at layer 3/4)." Well, as this is not good for the Tor network and makes it unnecessary easy for censors to argue for blocking Tor ("we just want to defend us against slow DOS attacks") I am wondering whether there is already some effort under way to detect and ban such kind of traffic. Or should there be such effort at all? Georg
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ tor-dev mailing list tor-dev@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev