[tor-bugs] #15463 [Tor]: Tor deals poorly with a very large number of incoming connection requests. (was: TOR CPU load 100%. Hidden service unavailable. Maybe zero-day vulnerability like "circuit storm".)

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Mar 27 01:29:02 UTC 2015


#15463: Tor deals poorly with a very large number of incoming connection requests.
--------------------------+--------------------------------
     Reporter:  alberto   |      Owner:
         Type:  defect    |     Status:  new
     Priority:  critical  |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor       |    Version:  Tor: 0.2.5.11
   Resolution:            |   Keywords:  tor-hs
Actual Points:            |  Parent ID:
       Points:            |
--------------------------+--------------------------------
Changes (by yawning):

 * keywords:   => tor-hs
 * version:   => Tor: 0.2.5.11
 * milestone:   => Tor: 0.2.7.x-final


Comment:

 Changing the title to something that better describes the symptoms of the
 issue.  As far as I can tell, this isn't anything new.  Tor always had a
 hard time dealing with an extreme number of HS clients, and this appears
 to be an extreme illustration of what is a known issue (In particular
 #8902).

 Note: I'm not ruling out a crazy client side bug here that causes it to
 retry in a tight loop, new intro point and all, but even if that's the
 case, the server side problems still exist and need to be addressed.

 So time to discuss potential solutions/mitigation ideas.

 Yes, this will be a clear improvement:
  * Solve #11447.  `8` is more than likely too high for a retry count,
 especially when under load.
  * Implement the performance fixes suggested in #8902.
  * Prop 224.  Faster public key crypto should help things here.

 Maybe an improvement:
  * Consider rejecting single hop client to RP circuits.  Probably not a
 great idea since Tor2Web uses this functionality for performance reasons,
 and people that want to mount the "pro" version of this can just run their
 own RP, so there's not much to gain here.
  * Give serious thought to being more aggressive about dropping INTRODUCE2
 cells when under load.  While this will not prevent a HS from being
 extremely hard to reach, the current behavior is clearly not optimal here.

 No, not an option:
  * Cycle the IP under load.  Fetching the new IP is trivial, there is no
 gain here, and a lot of really scary anonymity impacts. (This would be the
 opposite of #8239, which would be bad).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/15463#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list