As we bid farewell to 2023, we reflect on the hard work of the Tor Project's teams and their many noteworthy achievements to improve Tor and its experience for millions of users all around the world. Thank you to our community of users, volunteers, relay operators, partners, and donors for making these projects possible through their generous contributions.
Today, we are officially introducing a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks with the release of Tor 0.4.8.
Tor has released 0.4.7.7, the
first stable Tor release with support for congestion control. Congestion
control will result in significant performance improvements in Tor, once Exit
relays upgrade. Relay operators: please read!
With the deprecation of V2 onion services right around the corner, it is a good time to talk about V3 onion services. This post will discuss the most important privacy improvements provided by V3 onion services as well as their limitations. Aware of those limitations, our research group at the Institute of Network and Security at JKU Linz conducted an experiment that extracts information about how V3 onion services are being used from the Tor network.
In our last article, published in RIPE's website, we described the work that happened in 2020 related to giving IPv6 support to the Tor network. Tor 0.4.5.1-alpha is the first release that includes all the work described in the RIPE article. Relays running 0.4.5.1-alpha are the first to report IPv6 bandwidth statistics.
As you might have heard, some onion services have been experiencing issues with denial-of-service (DoS) attacks over the past few years. In this post, we would like to present you with two options that we believe can provide a long-term defense to the problem while maintaining the usability and security of onion services.