juanjo <jua...@avanix.es> writes:

> Ok, thanks, I was actually thinking about PoW on the Introduction Point 
> itself, but it would need to add a round trip, like some sort of 
> "authentication based PoW" before allowing to send the INTRODUCE1 cell. 
> At least it would make the overhead of clients higher than I.P. as the 
> clients would need to compute the PoW function and the I.P. only to 
> verify it. So if right now the cost of the attack is "low" we can add an 
> overhead of +10 to the client and only +2 to the I.P. (for example) and 
> the hidden service doesn't need to do anything.
>

Also see the idea in (b) (1) here: 
https://lists.torproject.org/pipermail/tor-dev/2019-April/013790.html
and how it couples with the "rendezvous approver" from ticket #16059.
Given a generic system there, adding proof-of-work is a possibility.

Another option would be to add the proof-of-work in the public parts of
INTRO1 and have the introduction point verify it which is not covered in
our email above.

Proof-of-work systems could be something to consider, altho tweaking a
proof-of-work system that would deny attackers and still allow normal
clients to visit it (without e.g. burning the battery of mobile clients)
is an open problem AFAIK.



_______________________________________________
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev

Reply via email to