from time to time we hear about ddos, and many other different attacks, is there any sense to implement next tools in whonix? would it bring better security to Whonix or not? all is open source:
hiawatha instead of lighttpd/apache:
Hiawatha can stop SQL injections, XSS and CSRF attacks and exploit attempts. Via a specially crafted monitoring tool, you can keep track of all your webservers. The SSL Labs website gives Hiawatha an A-rating, where Apache has a C.
of course, system like this can be made to prevent Tor traffic, but rules can be #disabled, modified, suricata can be made to be good for Tor usage.
suricata recommends perl scripts like pulledpig for monitoring suricata reports and for rules management, there is also snorby, based on ruby on rails … and Django based Scirius (web app for rules management).
codemonkey.net/evebox/ - EveBox attempts to provide something like a Gmail inbox approach to alerts. New alerts are placed in an “Inbox” where they can be archived or escalated (starred).
Sadly I can’t tell you much about the mentioned projects, you probably will have to try these yourself if you want to make sure. However, for basic Dos/DDos protection, I’d recommend simply setting up a small html with a captcha query for basic protection.
Adding to that, it should be noted that Dos/DDos isn’t really that big of a problem when hosting a hidden service for the simple reason that, with a few exeptions, most of the time an attempted attack is at “best” going to bring down a guard node or two but not the service you are hosting. That is also the main reason why some actually think about using Tor as a protection against Dos/DDos attacks even on the “clearnet”.
is there any sense to implement next tools in whonix?
As a defaults in Whonix no. Its out of scope as we care about shipping a generically useful OS instead of crafting a special image for every specific usecase you can think of. However you are very much encouraged to add any specific HS server advice to our wiki to educate people interested in that.
Realize that using application level traffic blacklisting/detection is an endless arms race.
As Ego mentioned, Tor provides a robust anti-DoS protection at layer 3 in the network stack.
simply setting up a small html with a captcha query for basic protection.
Be careful with that. Using third party services for this will harm your privacy.
okay, thank you for answers, I am agreed that you take care to provide general tor linux OS and it would be much bigger work for you to adapt whonix to all individuals and their needs.
considering ddos, I am agreed that simple captcha can do some protection for individual website/server, and Tor network already survived a massive ddos attack in the past.
possibly I will try to learn during the time to set up virtual server/routers/network (with Virtual Machines) in my laptop and to try to make attacks against hiawatha and apache/lighttpd/nginx inside of virtual machines. I will find tutorials how to do it.