(no title)
bureaucrat | 6 years ago
It's OK to use guards for yourself because
1) there are thousands of non-public guards(bridges) 2) you choose the path to the rendezvous point 3) middle nodes don't know the type of the traffic
Also there are a few things wrong with your article.
And the rendezvous point must be in this list (because you shouldn't have a private rendezvous node).
This is not true. The spec does not specify that. Usually Choopa LLC -- a cloud provider that is regularly used by hostile actors.
Choopa LLC is not regularly used by hostile actors. You can't say that citing one report. However, the relay, rendezvous, and exit nodes must be publicly known so that lots of Tor traffic will use them.
Not true with rendezvous points.
xb95|6 years ago
Anyway, Choopa is a common source of DDoS in our reports, so I can corroborate the OP's comment to some degree. They aren't the largest we see, but they're in the top 10 sources for us.
lima|6 years ago
It got so bad we ended up building and deploying our own line-rate packet processing engine at our network edge to be able to deal with the weird UDP protocols gaming uses.
How much spoofed traffic do you see nowadays?
az656|6 years ago