[tor-dev] Tor and slow DOS attacks
g.koppen at jondos.de
Wed Aug 24 19:21:00 UTC 2011
today, I read that blog post:
It is talking about the rise of slow DOS attacks and that Tor could play
an important role in it (in fact the post links to an already existing
tool for this attack properly configured to get used with Tor).
As one of the defenses (granted the last one on his list) the author
"Block TOR exit nodes before the traffic reaches your webservers (IE, at
Well, as this is not good for the Tor network and makes it unnecessary
easy for censors to argue for blocking Tor ("we just want to defend us
against slow DOS attacks") I am wondering whether there is already some
effort under way to detect and ban such kind of traffic. Or should there
be such effort at all?
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 490 bytes
Desc: OpenPGP digital signature
More information about the tor-dev