[tor-bugs] #24902 [Core Tor/Tor]: Denial of Service mitigation subsystem

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Feb 15 00:28:53 UTC 2018


#24902: Denial of Service mitigation subsystem
-------------------------------------------------+-------------------------
 Reporter:  dgoulet                              |          Owner:  dgoulet
     Type:  enhancement                          |         Status:
                                                 |  merge_ready
 Priority:  Very High                            |      Milestone:  Tor:
                                                 |  0.3.3.x-final
Component:  Core Tor/Tor                         |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tor-dos, tor-relay, review-          |  Actual Points:
  group-30, 029-backport, 031-backport,          |
  032-backport, review-group-31, SponsorV        |
Parent ID:                                       |         Points:
 Reviewer:  arma                                 |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by teor):

 Replying to [comment:70 dgoulet]:
 > Replying to [comment:69 teor]:
 > > My relay radia4 became unmeasured shortly after I disabled my firewall
 and started relying on the DDoS defences. And then a few hours later, it
 was measured again.
 > >
 > > I've checked that it's reachable on IPv4 and IPv6, and that the
 remaining firewall rules aren't blocking anything (unless the authorities
 are making *lots* of connections).
 > >
 > > Could the authorities (or the bandwidth authority clients) be
 triggering one of the defences?
 > > Aren't authorities meant to be exempted as relays?
 >
 > For reachability test, authority opens a one-hop circuit to the relay
 and it is authenticated right?

 Yes.

 > But anycase, there is no defense applied for known IPs and I assume
 dirauth are very known.

 It depends. If authorities set OutboundBindAddress, or their default route
 is through a non-public address, then their IPs won't be known. But they
 will be authenticated.

 > > Perhaps the bandwidth authority clients are building too many
 circuits?
 >
 > If the bwauth is opening more than 3 concurrent connections and doing on
 them 90 circuits burst at a rate of 3 circuit/second, then yes that is
 *crazy* and would trigger the defense. Or if it is opening more than 100
 TCP connections in parallel, all the other connections would get refused.
 >
 > > Edit: it was re-measured, not down
 >
 > The defense would be up for 60 minutes + rand(1, 30) minutes so if it
 was re-measured somehow properly without triggering the defense, I think
 that either the bwauth is on the edge there or it is not that.
 >
 > If the bwauth aren't opening that many circuits, I would blame the
 network load or/and bwauth code?

 Possibly. We should look for these issues in 0.3.3.2-alpha.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24902#comment:75>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list