- Joined
- Mar 10, 2019
That's what I said. The onion-location header is proper, the 302 redirect isn't.Not Tor's fault. It's because of the way Josh has configured it. There's not even any need for that 302 anymore, because of Onion-location.
That's what I said. The onion-location header is proper, the 302 redirect isn't.Not Tor's fault. It's because of the way Josh has configured it. There's not even any need for that 302 anymore, because of Onion-location.
Onion fixed.
Great advice!!!!Next time, try to keep the Tor site up even when the clear web site is down. It should be a priority.
Only the Cloudflare (kiwifarms.net) domain has the forced 302 redirect, but not the others I tested (.top and .ru), those have the Onion-Location header:That's what I said. The onion-location header is proper, the 302 redirect isn't.
@NullThe Tor hidden service is being used to conduct a DDoS attack (2000r/s, bypasses traditional filtering due to lack of an IP address) and will be disabled until I can look into mitigating it.
Here's a github project for it: https://github.com/r3nt0n/torDDoSSo, wait how the fuck does that work? It sounds like an interesting strategy to use but I don't know enough to understand why.
I'm using .hk and that's also working. So yeah.I am having the same problem with the redirects to the onion site on tor. I managed to connect using the .ru cctld.
I would recommend that @Null create an I2P hidden service at this point.Here's a github project for it: https://github.com/r3nt0n/torDDoS
Thing with TOR is that you can send a ton of requests from the same server and the hidden service cannot practically differentiate them. Makes an attack very easy.
Tor blog post about mitigating DDoS: https://blog.torproject.org/stop-the-onion-denial
It's also asymmetrical, i.e., the cost of actually sending disruptive packets is less than the damage to the site to process them. Imagine being so pathetic that your entire life is desperately attacking a lolcow site to get it down for a few hours a couple times a month.Here's a github project for it: https://github.com/r3nt0n/torDDoS
Thing with TOR is that you can send a ton of requests from the same server and the hidden service cannot practically differentiate them. Makes an attack very easy.
Tor blog post about mitigating DDoS: https://blog.torproject.org/stop-the-onion-denial
There is some more stuff you can do to mitigate. There's a script that basically replicates CloudFlare's CAPTCHA, can be modified to use JavaScript instead. That makes DDoS attacks much harder. You still need to protect yourself against Level 3 attacks (people attacking the CAPTCHA itself, which is just a static page), but Level 7 attacks basically go away.Here's a github project for it: https://github.com/r3nt0n/torDDoS
Thing with TOR is that you can send a ton of requests from the same server and the hidden service cannot practically differentiate them. Makes an attack very easy.
Tor blog post about mitigating DDoS: https://blog.torproject.org/stop-the-onion-denial