[tor-relays] could Tor devs provide an update on DOS attacks?

starlight.2017q4 at binnacle.cx starlight.2017q4 at binnacle.cx
Mon Jan 1 02:04:23 UTC 2018


At 07:36 12/31/2017 -0500, I wrote:
>
>. . . suggest adding support for circuit-extend rate-limiting of some kind or another. . .

Further in support of the request, for _12_hours_ preceding the most recent crash, the daemon reported:

Your computer is too slow to handle this many circuit creation requests. . .
[450043 similar message(s) suppressed in last 60 seconds]

and for the attack on the fast exit machine:

[1091489 similar message(s) suppressed in last 60 seconds]

I see no reason _any_ router should _ever_ have to handle this volume of circuit requests.  DOS attacks no doubt whatsoever.  Rate limit is needed to mitigate the problem.



More information about the tor-relays mailing list