[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #2668 [Core Tor/Tor]: Rate limit RELAY_EARLY and TLS by IP
#2668: Rate limit RELAY_EARLY and TLS by IP
--------------------------------+----------------------------------
Reporter: mikeperry | Owner: (none)
Type: defect | Status: closed
Priority: Medium | Milestone: Tor: unspecified
Component: Core Tor/Tor | Version: Tor: 0.2.7
Severity: Normal | Resolution: fixed
Keywords: tor-relay, tor-dos | Actual Points:
Parent ID: | Points: 3
Reviewer: | Sponsor:
--------------------------------+----------------------------------
Changes (by dgoulet):
* status: new => closed
* resolution: => fixed
Comment:
I think this also falls under #24902 which limits concurrent connection
per client IP address. The detection takes place *after* the TLS
negotiation since it is only at that point that we know if the client has
to be considered a client or relay.
#24767 will also helps by not making relays DoS each other in case the TCP
connection fails between relays.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2668#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs