Got it. Though on the client side, could we have a warning or have an option to hibernate a HS if they have been forced to switch guards N times in the last N minutes or hours or such? This would allow a DNS on the HS of course, but that may be preferable to discovery.
David Chasteen
PGP 0x48458ecd78833c0d
On Nov 9, 2014 12:49 PM, "Matthew Finkel" <matthew.finkel@gmail.com> wrote:_______________________________________________On Sun, Nov 09, 2014 at 12:34:01PM -0500, David Chasteen wrote:
> Would it be possible to create some kind of tor weather-like detection
> and alert system to warn if such a massive DoS attack were underway such
> that users could know that perhaps now might not be the best possible
> time to use Tor? A hidden threat is worse than a known one. We're not
> going to be able to mitigate every known threat, but making users aware
> that the threat profile is heightened can allow them to make informed
> risk decisions.
>
Unfortunately we don't receive any real-time statistics from relays,
and our metrics calculations are run daily, so there's a significant
delay in any visualizations we generate. Perhaps we can still look for
and see long-term attacks (> 24-36 hours) but nothing that will
significantly benefit users shortly after the attack begins.
_______________________________________________
tor-internal mailing list
tor-internal@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-internal
tor-internal mailing list
tor-internal@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-internal