[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] could Tor devs provide an update on DOS attacks?



At 07:36 12/31/2017 -0500, I wrote:
>
>. . . suggest adding support for circuit-extend rate-limiting of some kind or another. . .

Further in support of the request, for _12_hours_ preceding the most recent crash, the daemon reported:

Your computer is too slow to handle this many circuit creation requests. . .
[450043 similar message(s) suppressed in last 60 seconds]

and for the attack on the fast exit machine:

[1091489 similar message(s) suppressed in last 60 seconds]

I see no reason _any_ router should _ever_ have to handle this volume of circuit requests.  DOS attacks no doubt whatsoever.  Rate limit is needed to mitigate the problem.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays