Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
Trac
Trac
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Wiki
    • Wiki
  • Members
    • Members
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • Legacy
  • TracTrac
  • Issues
  • #20212

Closed (moved)
Open
Opened Sep 21, 2016 by GA@gacar

Tor can be forced to open too many circuits by embedding .onion resources

A malicious web page or an exit node* can force Tor to open too many new circuits by embedding resources from multiple .onion domains.

I could observe up to 50 new circuits per second, and a total of a few hundred circuits in less than a half minute.

The embedded HS domains don't need to exist, Tor will still open an new internal circuit for each .onion domain to download the descriptors.

I guess forcing clients to make too many circuits may enable certain attacks, even though the circuits are internal.

Maybe Tor (or Tor Browser) could cap the number of new circuits opened within a time window. I can't think of a realistic use case for loading resources from tens of different hidden services.

*: only when the connection is unencrypted HTTP

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Tor: unspecified
Milestone
Tor: unspecified
Assign milestone
Time tracking
None
Due date
None
Reference: legacy/trac#20212