[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #24902 [Core Tor/Tor]: Denial of Service mitigation subsystem
#24902: Denial of Service mitigation subsystem
-------------------------------------------------+-------------------------
Reporter: dgoulet | Owner: dgoulet
Type: enhancement | Status:
| needs_review
Priority: Very High | Milestone: Tor:
| 0.3.3.x-final
Component: Core Tor/Tor | Version:
Severity: Normal | Resolution:
Keywords: ddos, tor-relay, review-group-30, | Actual Points:
029-backport, 031-backport, 032-backport |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by dgoulet):
Replying to [comment:21 nickm]:
> We need to test this DESTROY change to make sure it still works the way
we think. I'll go over the old branch and the new commits, as well as the
new branch, later on tonight. :)
Been running for more than 40 minutes on my relay. So far so good it
appears. Here is the heartbeat after 30 minute of running:
{{{
Jan 22 20:42:04.863 [notice] DoS mitigation since startup: 286298 cells
rejected, 127 marked address. 147 MB have been dropped. 15692 connection
rejected. 3585 tor2web client refused.
}}}
What I'm wondering is if the fact that we don't send CREATED back makes
the client switch Guard faster?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24902#comment:22>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs