[tor-bugs] #19984 [Core Tor/Tor]: Use a better set of comparison/evaluation functions for deciding which connections to kill when OOS
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Dec 8 21:34:52 UTC 2017
#19984: Use a better set of comparison/evaluation functions for deciding which
connections to kill when OOS
--------------------------+------------------------------------
Reporter: nickm | Owner: nickm
Type: defect | Status: accepted
Priority: Low | Milestone: Tor: 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: dos, sockets | Actual Points:
Parent ID: | Points: 2
Reviewer: | Sponsor: SponsorV-can
--------------------------+------------------------------------
Comment (by Hello71):
normally, one would use IP reputation to deal with spamming attacks.
however, for obvious reasons, I can see why that might be frowned upon in
these circles.
therefore, some other unfalsifiable proof of work is required. one could
implement a custom proof-of-work protocol, but it seems more useful to me
to measure the bandwidth used. this incurs negligible overhead for
legitimate users, but has the added benefit that attackers are forced to
encrypt their data in order to increase their bandwidth usage.
additionally, if attackers have vastly more bandwidth than you, they can
simply mount a traditional DoS attack anyways.
tl;dr just sort connections by recently used valid data traffic.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/19984#comment:12>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list