DDoS attacks via TOR?
Dmitriy Kazimirov
dkazimirow at gmail.com
Thu Nov 6 02:03:49 UTC 2008
I think it's potentially possible to DDoS hidden service if it's dynamic
site and simple cannot server ENOUGH requests per second
(i.e. overload number of apache processes,etc)
of course sometimes it's possible to place hidden service on EC2 with
load-balacing and nodes autostartup on demand but it's costly...
Also issue of hidden service keeping A LOT of connections open - is someone
checked how this work will?
Is there any statistic on any even remotely popular hidden services
available?
2008/11/6 Ted Smith <teddks at gmail.com>
> In a similar vein, I've heard rumors of DDoS being attempted on hidden
> service targets. My initial reaction was that this would just DoS the
> network, but is there any chance I'm wrong?
>
> On Thu, 2008-11-06 at 07:12 +0600, Dmitriy Kazimirov wrote:
> > Btw, about policy,
> > I'm curious what will happen if highly popular(equivalent web site has
> > dedicated server and utilize it) hidden service will be created. Could
> > Tor network carry such load?
> > (if site content for download is rather small files,less than Mb in
> > general)
> >
> > 2008/11/6 Roger Dingledine <arma at mit.edu>
> > On Wed, Nov 05, 2008 at 11:51:40PM +0100, dr._no at cool.ms
> > wrote:
> > > is there any documented case of a DDoS attack via TOR or is
> > > a DDoS attack via TOR only an urban legend?
> >
> >
> > It doesn't make any sense to DDoS people over Tor. It wouldn't
> > work.
> >
> > See also https://www.torproject.org/faq-abuse#DDoS
> >
> > --Roger
> >
> >
> >
> >
> > --
> > --
> > Best Regards,
> >
>
--
--
Best Regards,
Dmitriy Kazimirov,
Senior C++/C# Developer
of ISS Art, Ltd., Omsk, Russia
Web: http://www.issart.com
E-mail: dkazimirov at issart.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20081106/b2e913f3/attachment.htm>
More information about the tor-talk
mailing list