[tor-bugs] #31223 [Core Tor/Tor]: Research approaches for improving the availability of services under DoS

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Jul 23 11:45:30 UTC 2019


#31223: Research approaches for improving the availability of services under DoS
--------------------------------+--------------------------------
     Reporter:  asn             |      Owner:  (none)
         Type:  defect          |     Status:  new
     Priority:  Medium          |  Milestone:  Tor: 0.4.3.x-final
    Component:  Core Tor/Tor    |    Version:
     Severity:  Normal          |   Keywords:  tor-hs tor-dos
Actual Points:                  |  Parent ID:
       Points:  15              |   Reviewer:
      Sponsor:  Sponsor27-must  |
--------------------------------+--------------------------------
 We've been improving the health of the network during onion service DoS,
 but not the onion service availability. This is a task for looking at this
 angle.

 During the related Stockholm session we looked into various approaches
 that could help us towards that goal. Here are some of them:

 - Introducing application-layer anonymous tokens that allow legit clients
 to get priority over DoS attacker
 - PoW approaches like argon2
 - CAPTCHA approaches like introducing a token server giving reCAPTCHA
 tokens
 - Hiding introduction points by rate limiting how quickly clients can find
 them. Valet nodes?
 - Having intros check that clients don't use the same IP over and over.
 Proof-of-existence?
 - Pay bitcoin to introduce

 Each of the above solutions has problems and this is a ticket to
 investigate at least the most promising of them, and attempt to move
 forward with something.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/31223>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list