<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
</head>
<body>
<p>Hello, since months ago we are debating proposals about how to
stop HS being DDoSed. We have many open issues and even developed
in a rush a fix "just for the network" (not HS availability).</p>
<p>But, I have not seen yet a good explanation about what is really
happening when HS is being DDoSed by this famous and effective
attack. I mean, the only thing I know about it is that its goal is
to send a ton of INTRODUCE2 cells to the HS, but, what is the cost
for the attacker? Some questions need to be answered, at least If
I want to understand it and make a proposal for fixing this
issues.</p>
<p><b>Questions:</b></p>
<p>Is the attacker building a circuit to the Rendz point as expected
by the protocol? How can we be sure of that?</p>
<p>-Attacker (client) to Rendezvous point circuit:</p>
<p>What is exactly happening on this circuit and how can the
attacker improve the attack?<br>
</p>
<p>Is the attacker using the same Rendz over and over for its
INTRODUCE1? A new circuit to the Rendz? Can the first two hops of
a circuit be reused (only changing the exit node) so it can build
a new circuit to a new Rendz faster and make the attack better?</p>
<p>-Attacker (client) to Intro point: <br>
</p>
<p>what is exactly happening on this side of the equation? <br>
</p>
<p><br>
</p>
<p>Sorry, but I could not find the answer to these questions and
what is going on on any ticket or this mail lists. <br>
</p>
</body>
</html>