Actually, I did know that 300Mb/sec isn't super-huge for Denial of Service attacks at least, but this is an "obscure" Tor node. Someone attacking it at this stage in the game has a real agenda (perhaps they want to see if certain websites get disrupted? Does Tor work that way for short-ish periods of time?)

At 4Gb/s into the router, I'd guess that router is hooked up to 2 GbEs mapped over a pair of OC-48s (Sounds a lot like the architecture Cisco has sold certain GbE-centered Datapipe providers.) Your attacker might actually be interested in pre-stressing the infrastructure in front of that router.

Just a guess, but I'm "stupid" after all.

-TD

From: Eugen Leitl <[EMAIL PROTECTED]>
To: Dan McDonald <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Re: [Clips] Finger points to British intelligence as al-Qaeda websites are wiped out
Date: Tue, 2 Aug 2005 10:15:49 +0200

On Mon, Aug 01, 2005 at 05:12:38PM -0400, Dan McDonald wrote:

> I'm surprised that the target node has that much INBOUND bandwidth, quite
> frankly.

The node itself has only a Fast Ethernet port, but there's
some 4 GBit available outside of the router.

I'm genuinely glad the node has been taken offline as soon
as the traffic started coming in in buckets, and I didn't
have to foot the entire bill (the whole incident only
cost me 20-30 GByte overall as far as I can tell).

--
Eugen* Leitl <a href="http://leitl.org";>leitl</a>
______________________________________________________________
ICBM: 48.07100, 11.36820            http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 1.01d removed an attachment of type application/pgp-signature which had a name of signature.asc]


Reply via email to