[tor-talk] What happen if one create 2000 exit nodes for 6 hours?

Andrew andrew at pdqvpn.com
Mon Nov 21 17:35:47 UTC 2011


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/21/2011 10:14 AM, Damian Johnson wrote:
> Hi Fabio. What you're describing is a sybil attack. An attacker 
> definitely *wouldn't* get a majority of the exit traffic for those 
> destinations - clients weigh relay selection by heuristics reported
> by the bandwidth authorities. Those authorities take a long time to
> warm up to new relays, so it would take quite a bit of uptime
> before they'd start seeing a substantial chunk of traffic.
> 
> Also, we'd get an alarm and cut them out of the consensus, for an
> example see... 
> https://trac.torproject.org/projects/tor/wiki/doc/badRelays#trotsky
>
>  short summary: 747 exits suddenly appeared and were dropped from
> the consensus
> 
> That said, smaller and slower sybil adversaries could go undetected
> so if you see something fishy then let us know! -Damian 
> _______________________________________________ tor-talk mailing
> list tor-talk at lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk


Good thing we trust Moritz, torservers.net is growing. :P


Disclaimer: I have spoken with Moritz in the past and is very aware of
these type of concerns and was making efforts to mitigate them.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.17 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBAgAGBQJOyovzAAoJEJW/J8aB8dYIfbcIALOXkir+dsBSP0vAay7e7zx4
U6LMX4ZzDhpJz3kaQnl39e+EvZeCnFMtVAhbhVZlN7yLPf4n6u8vCc/IWuoF7ie+
CI28fEZ8EKLNbOmBeDd2bhKVqKMYVeE2Hk7PL/YR1pPUb6mR15PqliaLA3jS9FGc
G8Jerya7teyTvx0b9JPxch+KN4FW+hrys+GwWOz1HIxZ/z4aehFkmKWqSin2dEQH
vfvn9GTVw/8CqvTSNKE9M1O1WMcknHuwrj3mwiL0aqRHuA8HE0sl80/ONUNgIunY
vCTbkly/UuKhUwC4PGiVImVt7fJPdebJg9WGBWCWPekGUtf1B83TfszXLh1wrho=
=EKqx
-----END PGP SIGNATURE-----


More information about the tor-talk mailing list