SITREP: Advanced DDoS Mitigation & The Introduction of PoW Rotators
Over the last 96 hours, the Torzon network infrastructure has been subjected to a sustained, high-bandwidth Layer 7 Distributed Denial of Service (DDoS) attack. Unlike typical volumetric attacks that simply flood the onion rendezvous points with junk data, this specific campaign utilizes a sophisticated botnet capable of emulating legitimate browser headers, effectively bypassing standard Nginx rate-limiting configurations.
The Attack Vector Explained
The attackers are exploiting the Tor protocol's "Introduction Point" mechanism. By flooding these points with millions of circuit creation requests, they force the Tor daemon to expend CPU resources handling handshakes rather than processing legitimate user data. This results in the "Timout" or "Connection Refused" errors many of you have seen. The attack signature suggests a rented botnet, likely paid for by a competitor market attempting to capture market share during the Q4 rush.
Our Response: "Endgame" Protocol
To counter this, we have deployed a three-stage mitigation strategy known internally as "Endgame." This is not a temporary fix but a permanent architectural upgrade.
1. Client-Side Proof of Work (PoW)
We have implemented a cryptographic challenge system. Before your browser is allowed to load the login page, it must solve a SHA-256 hash collision puzzle. This happens automatically via JavaScript. For a legitimate user, this takes 2-5 seconds and is barely noticeable. For an attacker trying to send 10,000 requests per second, the computational cost becomes astronomical, causing their botnet servers to crash or become unresponsive. Do not close the tab if you see a "Verifying Browser" screen; let the calculation finish.
2. Backend Decoupling
We have completely separated the frontend web servers (mirrors) from the backend database and wallet nodes. Previously, if the main URL was hit, the database would lock up. Now, even if 10 public mirrors are taken offline by a flood, the backend remains functional. This allows users on private bridges or rotational mirrors to continue trading without latency. This architecture ensures that "Market Lock" is statistically impossible.
3. Rotational Onion V3 Pools
We have expanded our mirror pool from 12 static addresses to a dynamic pool of 50+. These addresses are rotated every 6 hours. If an attacker targets a specific mirror, it is automatically discarded and replaced within minutes. We urge all users to check the Mirrors Page daily and import the PGP-signed list of current nodes.