[tor-bugs] #19984 [Core Tor/Tor]: Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Dec 8 21:34:52 UTC 2017


#19984: Use a better set of comparison/evaluation functions for deciding which
connections to kill when OOS
--------------------------+------------------------------------
 Reporter:  nickm         |          Owner:  nickm
     Type:  defect        |         Status:  accepted
 Priority:  Low           |      Milestone:  Tor: 0.3.3.x-final
Component:  Core Tor/Tor  |        Version:
 Severity:  Normal        |     Resolution:
 Keywords:  dos, sockets  |  Actual Points:
Parent ID:                |         Points:  2
 Reviewer:                |        Sponsor:  SponsorV-can
--------------------------+------------------------------------

Comment (by Hello71):

 normally, one would use IP reputation to deal with spamming attacks.
 however, for obvious reasons, I can see why that might be frowned upon in
 these circles.

 therefore, some other unfalsifiable proof of work is required. one could
 implement a custom proof-of-work protocol, but it seems more useful to me
 to measure the bandwidth used. this incurs negligible overhead for
 legitimate users, but has the added benefit that attackers are forced to
 encrypt their data in order to increase their bandwidth usage.
 additionally, if attackers have vastly more bandwidth than you, they can
 simply mount a traditional DoS attack anyways.

 tl;dr just sort connections by recently used valid data traffic.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19984#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list