[tor-relays] could Tor devs provide an update on DOS attacks?
starlight.2017q4 at binnacle.cx
starlight.2017q4 at binnacle.cx
Mon Jan 1 02:04:23 UTC 2018
At 07:36 12/31/2017 -0500, I wrote:
>
>. . . suggest adding support for circuit-extend rate-limiting of some kind or another. . .
Further in support of the request, for _12_hours_ preceding the most recent crash, the daemon reported:
Your computer is too slow to handle this many circuit creation requests. . .
[450043 similar message(s) suppressed in last 60 seconds]
and for the attack on the fast exit machine:
[1091489 similar message(s) suppressed in last 60 seconds]
I see no reason _any_ router should _ever_ have to handle this volume of circuit requests. DOS attacks no doubt whatsoever. Rate limit is needed to mitigate the problem.
More information about the tor-relays
mailing list