[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #2668 [Core Tor/Tor]: Rate limit RELAY_EARLY and TLS by IP



#2668: Rate limit RELAY_EARLY and TLS by IP
--------------------------------+----------------------------------
 Reporter:  mikeperry           |          Owner:  (none)
     Type:  defect              |         Status:  closed
 Priority:  Medium              |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor        |        Version:  Tor: 0.2.7
 Severity:  Normal              |     Resolution:  fixed
 Keywords:  tor-relay, tor-dos  |  Actual Points:
Parent ID:                      |         Points:  3
 Reviewer:                      |        Sponsor:
--------------------------------+----------------------------------
Changes (by dgoulet):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 I think this also falls under #24902 which limits concurrent connection
 per client IP address. The detection takes place *after* the TLS
 negotiation since it is only at that point that we know if the client has
 to be considered a client or relay.

 #24767 will also helps by not making relays DoS each other in case the TCP
 connection fails between relays.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2668#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs