[tor-relays] DoS attacks on multiple relays

teor teor2345 at gmail.com
Tue Dec 5 22:03:18 UTC 2017


> On 5 Dec 2017, at 22:50, x9p <tor at x9p.org> wrote:
> 
> 
> my second and third positions are similar:
> 
>      ...

Please don't publicly share exact connection numbers and netblocks.
They can be used in combination with other information to de-anonymise users.

(For example, if an adversary knows that a guard has 5 connections from
a netblock that they can't otherwise observe, they can go and hunt down
those users.)

> On 6 Dec 2017, at 07:42, null <null at omuravpn.com> wrote:
> 
> ...
> @ Scott Bennett:
> 
>>     What you are seeing is most likely the same phenomenon brought up on
>> this list repeatedly over at least the last decade or so.  That phenomenon
>> is providing HSDir service, or perhaps a rendez-vous point, for a popular
>> hidden service.
> 
>> If you don't like it, you can set
>> 
>> HidServDirectoryV2      0
> 
> Thanks for your reply. The data suggests this was not the case (this
> time). Some of these relays have been up almost a year with the same
> configuration, often with the HSDir flag. The recent issues just
> started occurring, and happened across several relays during the same
> timeframe.
> 
> Nonetheless, we're not opposed to disabling HidServDirectoryV2 to rule
> it out. However it appears that option is deprecated (on 0.3.1.9).
> Enabling it causes this in the log:
> 
>  [WARN] Skipping obsolete configuration option 'HidServDirectoryV2'
> 
> It's also no longer listed in the Tor manual
> (https://www.torproject.org/docs/tor-manual.html.en). It looks like we
> might be able to achieve the same effect with something like this
> instead:
> 
>  MinUptimeHidServDirectoryV2 52 weeks
> 
> Anyone have any info on why HidServDirectoryV2 is consider obsolete?
> Is using MinUptimeHidServDirectoryV2 instead going to achieve the same
> effect?

No, this option only applies to directory authorities, and determines their
votes for the HSDir flag.

From the tor man page:

       MinUptimeHidServDirectoryV2 N seconds|minutes|hours|days|weeks
           Minimum uptime of a v2 hidden service directory to be accepted as
           such by authoritative directories. (Default: 25 hours)

>>> We have file descriptors (/proc/sys/fs/file-max) set to 64000, but it looks
>>> like Tor sets MAX_FILEDESCRIPTORS to 16384 per /etc/init.d/tor:
>>> 
>>>  elif [ "$system_max" -gt "40000" ] ; then
>>>    MAX_FILEDESCRIPTORS=16384
>>> 
>>> Surely that is high enough for normal service?
>> 
>>     If by normal you mean "low traffic", then yes, it's probably enough.
>> However, that's really not very high in a general sense.
> 
> 
> Why does the default /etc/init.d/tor (from the Debian/Ubuntu pkg) cap
> MAX_FILEDESCRIPTORS at 16384 then? We have it set to 64000 otherwise.
> Obviously we could comment out these lines, but it seems odd the
> default config tries to cap it at 16384 if that's too low for a high
> traffic relay.

Perhaps it's the maximum allowed on some kernels or low-memory systems?
Or perhaps it's historical?

I suggest that you submit a ticket or patch to the debian bug tracker.

T

--
Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmpp: teor at torproject dot org
------------------------------------------------------------------------



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: Message signed with OpenPGP
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20171206/0e374cc1/attachment.sig>


More information about the tor-relays mailing list