-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable Tor Proof-of-Work defenses for Onion Services #6933
Comments
Looks like efforts to build with |
@zenmonkeykstop I think for this one, we mainly only need to add the config params in the torrc file. Let me know when we decide on the values and I can help with that! |
@prateekj117 there is probably a bit more there to do, as I'd expect this would be an optional setting that admins could enable/disable - and we'd have to apply it cleanly to existing instances. But very open to any thoughts/research you may have on appropriate parameters, I haven't looked to see how it's been working out for other onion service operators so far. |
some useful docs here: https://gitlab.torproject.org/tpo/onion-services/onion-support/-/wikis/Documentation/PoW-FAQ#configuring-an-onion-service-with-the-pow-protection The default config looks like this (added as part of a hidden service stanza):
PoWQueueRate is "The sustained rate of rendezvous requests to dispatch per second from PoWQueueBurst is "The maximum burst size for rendezvous requests handled from the As per @legoktm's take, this would be applied on non-auth services only (so just the SI). Thinking on approaches to this from UX perspective: add in
|
I have this running on my QA instance from https://github.com/freedomofpress/securedrop/compare/ef9aad6^..9fd6f7e, defaulting to enabled on new |
See https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/ for details on the feature itself.
https://community.torproject.org/onion-services/advanced/dos/ contains documentation on the different configuration options we need to set.
One catch is that the PoW puzzles are LGPL, so a new
--enable-gpl
flag needs to be set at build time. There are 0.4.8.4 packages on deb.torproject.org now, but they don't have the GPL bits enabled, so we might need to do our own builds. I've commented on https://forum.torproject.org/t/proof-of-work-pow-defense-for-onion-service-is-released/8887 asking if they're going to provide GPL builds (my comment is still pending moderation).In checklist form:
The text was updated successfully, but these errors were encountered: