burbilog: (Default)
burbilog ([personal profile] burbilog) wrote in [site community profile] dw_maintenance 2017-04-10 03:15 pm (UTC)

Yes, consider this: if you serve native Tor and block Tor exit nodes (these are anyway could be malicious and could do much more harm besides dumb DDoS) then your main system is not going to be affected anymore by Tor attacks. On other hand, if someone somehow DDoSes your Tor subsystem, only that service is going to be down.

From Tor FAQ:

What about distributed denial of service attacks?

Distributed denial of service (DDoS) attacks typically rely on having a group of thousands of computers all sending floods of traffic to a victim. Since the goal is to overpower the bandwidth of the victim, they typically send UDP packets since those don't require handshakes or coordination.

But because Tor only transports correctly formed TCP streams, not all IP packets, you cannot send UDP packets over Tor. (You can't do specialized forms of this attack like SYN flooding either.) So ordinary DDoS attacks are not possible over Tor. Tor also doesn't allow bandwidth amplification attacks against external sites: you need to send in a byte for every byte that the Tor network will send to your destination. So in general, attackers who control enough bandwidth to launch an effective DDoS attack can do it just fine without Tor.

Post a comment in response:

This account has disabled anonymous posting.
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org