[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] could Tor devs provide an update on DOS attacks?
At 07:36 12/31/2017 -0500, I wrote:
>
>. . . suggest adding support for circuit-extend rate-limiting of some kind or another. . .
Further in support of the request, for _12_hours_ preceding the most recent crash, the daemon reported:
Your computer is too slow to handle this many circuit creation requests. . .
[450043 similar message(s) suppressed in last 60 seconds]
and for the attack on the fast exit machine:
[1091489 similar message(s) suppressed in last 60 seconds]
I see no reason _any_ router should _ever_ have to handle this volume of circuit requests. DOS attacks no doubt whatsoever. Rate limit is needed to mitigate the problem.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays