Re: [tor-dev] Merger and Mainline Handovers

2019-05-30 Thread teor
> On 31 May 2019, at 02:26, Nick Mathewson wrote: > >> On Wed, Apr 17, 2019 at 5:13 AM teor wrote: >> When does 0.4.0 stop being mainline? >> >> It looks like people aren't merging backports to 0.4.0 any more. >> That's probably a good idea: we should minimise release candidate changes. >>

Re: [tor-dev] Onion Service - Intropoint DoS Defenses

2019-05-30 Thread juanjo
Nice to try to stop this DoS vulnerability at network design level. Can we have an estimation of when will be released this antiDoS features? 0.4.1.x or 0.4.2.x ? And just came to my mind reading this, that to stop these attacks we could implement some authentication based on Proof of Work

Re: [tor-dev] Network team: New status page for 0.4.1; help needed on ticket triage

2019-05-30 Thread Nick Mathewson
y.) Update: I have removed all the tickets that were not 041-should or 041-must from the 0.4.1.x-final milestone. Before doing this, I gave them all the keyword "041-deferred-20190530" so that everybody can look them over and see if I messed up. Some of them are now in 0.4.2.x-final and

Re: [tor-dev] Merger and Mainline Handovers

2019-05-30 Thread Nick Mathewson
On Wed, Apr 17, 2019 at 5:13 AM teor wrote: > When does 0.4.0 stop being mainline? > > It looks like people aren't merging backports to 0.4.0 any more. > That's probably a good idea: we should minimise release candidate changes. > > When should I start doing 0.4.0 merges as part of the backports?

Re: [tor-dev] Onion Service - Intropoint DoS Defenses

2019-05-30 Thread teor
Hi, > On 30 May 2019, at 23:49, David Goulet wrote: > > Over the normal 3 intro points a service has, it means 150 introduction > per-second are allowed with a burst of 600 in total. Or in other words, 150 > clients can reach the service every second up to a burst of 600 at once. This >

[tor-dev] Onion Service - Intropoint DoS Defenses

2019-05-30 Thread David Goulet
Greetings! As some of you know, a bunch of onion services were or are still under heavy DDoS on the network. More specifically, they are bombarded with introduction requests (INTRODUCE2 cells) which forces them to rendezvous for each of them by creating a ton of circuits. This basically leads to