[tor-bugs] #16052 [Tor]: Hidden service socket exhaustion by opening many connections

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat May 16 19:20:16 UTC 2015


#16052: Hidden service socket exhaustion by opening many connections
------------------------+------------------------------------------
     Reporter:  asn     |      Owner:
         Type:  defect  |     Status:  new
     Priority:  normal  |  Milestone:  Tor: 0.2.7.x-final
    Component:  Tor     |    Version:
   Resolution:          |   Keywords:  tor-hs dos SponsorR SponsorU
Actual Points:          |  Parent ID:
       Points:          |
------------------------+------------------------------------------

Comment (by TvdW):

 In general DoSes and DDoSes can be mitigated by making sure the server has
 more capacity than the client. From these follow my two suggestions :

  * Donncha's summer of privacy project (to allow load balancing HSes)
 would allow server owners to just add more servers to the HS.
  * Introducing a Hashcash (proof-of-work) based system into HS connections
 should significantly decrease client capacity. This would ensure that the
 attacker needs significantly more hardware than the HS hoster. Of course
 it's important that the hashcash settings are tunable.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/16052#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list