There's someone flooding all JoinMarket makers with !orderbook requests. Making them run out of storage with several GBs of logs per hour and also filling their CPU cycles. It does so through direct onion connections (last time was through directories) and with a bunch of nicks in parallel.
I've implemented Tor level DDoS protection through a dynamic PoW requirement (0 in normal cases) in a branch of jm-ng as an experiment:
It only works with the alpha release of Tor, but an expected release might come soon.
I didn't know about this feature from Tor, but it's really neat. Some more info here:
#JoinMarketNG #JoinMarket #CoinJoin
GitHub
feat: Add Tor PoW DoS defense for hidden services by m0wer · Pull Request #108 · m0wer/joinmarket-ng
JoinMarket (Bitcoin CoinJoin) modern alternative implementation - feat: Add Tor PoW DoS defense for hidden services by m0wer · Pull Request #108 ...
Tor Project | Onion service DoS guidelines
Defend yourself against tracking and surveillance. Circumvent censorship. | Onion service DoS guidelines