Limitations of a bigger hidden service in I2P
Posted: 03 Dec 2019 03:12
I am curious what the I2P specific limitations for a big hidden service are.
I come straight from the Tor community and i would like to write a post for /d/I2P in dread where i compare I2P and Tor and their suitability for a bigger hidden service so i hope someone here who knows more about I2P then i do (yet) can help me expanding my mind about I2P.
Since about half a year Tor hidden services are getting easily teared down by a DDoS which sends so many introduction requests to the Tor daemon that Tor fails to build all of them and therefore gets unresponsive for all clients.
Tor uses rendezvous relays which are chosen by the client if a connection to a specific hidden service should be established so a majority of workload when building a connection to a hidden service is on the hidden services side because for every client introduction request the hidden service need to build a connection to that rendezvous relay and need to wait there for the handshake with the client.
As far as i understand an attack like that would not be possible in I2P because the tunnels are already built during startup and all clients enter one of the up to 6 tunnels of the hidden service.
But what seems to be the solution to many of Tors current problems might be a big bottleneck for a bigger hidden service.
Reading that page https://geti2p.net/en/about/performance tells me that in the best case a tunnel can serve 50 KByte/s so 300 KByte/s for a hidden service with 6 tunnels.
I understand that with multihoming (which seems to be similar to Tors naive onion balancing) more than one instance can host the same hidden service public key (address) so you can spread the load through more instances which all provide their own tunnels.
Reading that page https://geti2p.net/spec/proposals/140-i ... ultihoming tells me that 100 multihoming routers "presumably wont work".
How many multihoming instances are feasible before running into other problems?
Are there any known DDoS attacks for I2P yet?
Or more general which are the I2P specific limitations if i would like to operate a bigger hidden service?
(By the way i search a co-mod for the I2P subdread in dread.
viewtopic.php?f=32&t=896 )
I come straight from the Tor community and i would like to write a post for /d/I2P in dread where i compare I2P and Tor and their suitability for a bigger hidden service so i hope someone here who knows more about I2P then i do (yet) can help me expanding my mind about I2P.
Since about half a year Tor hidden services are getting easily teared down by a DDoS which sends so many introduction requests to the Tor daemon that Tor fails to build all of them and therefore gets unresponsive for all clients.
Tor uses rendezvous relays which are chosen by the client if a connection to a specific hidden service should be established so a majority of workload when building a connection to a hidden service is on the hidden services side because for every client introduction request the hidden service need to build a connection to that rendezvous relay and need to wait there for the handshake with the client.
As far as i understand an attack like that would not be possible in I2P because the tunnels are already built during startup and all clients enter one of the up to 6 tunnels of the hidden service.
But what seems to be the solution to many of Tors current problems might be a big bottleneck for a bigger hidden service.
Reading that page https://geti2p.net/en/about/performance tells me that in the best case a tunnel can serve 50 KByte/s so 300 KByte/s for a hidden service with 6 tunnels.
I understand that with multihoming (which seems to be similar to Tors naive onion balancing) more than one instance can host the same hidden service public key (address) so you can spread the load through more instances which all provide their own tunnels.
Reading that page https://geti2p.net/spec/proposals/140-i ... ultihoming tells me that 100 multihoming routers "presumably wont work".
How many multihoming instances are feasible before running into other problems?
Are there any known DDoS attacks for I2P yet?
Or more general which are the I2P specific limitations if i would like to operate a bigger hidden service?
(By the way i search a co-mod for the I2P subdread in dread.
viewtopic.php?f=32&t=896 )