[tor-dev] Request info about how the Tor HS DoS works
juanjo
juanjo at avanix.es
Tue Jan 7 17:58:48 UTC 2020
Hello, since months ago we are debating proposals about how to stop HS
being DDoSed. We have many open issues and even developed in a rush a
fix "just for the network" (not HS availability).
But, I have not seen yet a good explanation about what is really
happening when HS is being DDoSed by this famous and effective attack. I
mean, the only thing I know about it is that its goal is to send a ton
of INTRODUCE2 cells to the HS, but, what is the cost for the attacker?
Some questions need to be answered, at least If I want to understand it
and make a proposal for fixing this issues.
*Questions:*
Is the attacker building a circuit to the Rendz point as expected by the
protocol? How can we be sure of that?
-Attacker (client) to Rendezvous point circuit:
What is exactly happening on this circuit and how can the attacker
improve the attack?
Is the attacker using the same Rendz over and over for its INTRODUCE1? A
new circuit to the Rendz? Can the first two hops of a circuit be reused
(only changing the exit node) so it can build a new circuit to a new
Rendz faster and make the attack better?
-Attacker (client) to Intro point:
what is exactly happening on this side of the equation?
Sorry, but I could not find the answer to these questions and what is
going on on any ticket or this mail lists.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20200107/fd41fd47/attachment.html>
More information about the tor-dev
mailing list