#24902: Denial of Service mitigation subsystem -------------------------------------------------+------------------------- Reporter: dgoulet | Owner: dgoulet Type: enhancement | Status: | needs_review Priority: Very High | Milestone: Tor: | 0.3.3.x-final Component: Core Tor/Tor | Version: Severity: Normal | Resolution: Keywords: ddos, tor-relay, review-group-30, | Actual Points: 029-backport, 031-backport, 032-backport | Parent ID: | Points: Reviewer: | Sponsor: -------------------------------------------------+-------------------------
Comment (by dgoulet): I've gone over Roger's review in the oniongit. Some discussions are left to be answered. asn will soon hand off to me a unittests branch (very awesome) so expect that at some point, I'll take over and put it in as an extra commit. > I think we should add two more Tor2web defenses managed by a consensus parameter: Thanks teor for this, I 100% agree with you. What I'm wondering here is if we should take the time to also implement these and backport them or for now we only put in the RP one (which I think the worst one because clients do open the RP before doing the introduction) and put the others in 034+ ? If the later, I propose we open a new ticket for this "anti DoS + tor2web" issue because also at that point, if we end up with relays just denying direct client connections for HS purposes, we should start considering strongly to rip off the tor2web code from Tor. I won't start a "why do that discussion" in this ticket. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24902#comment:17> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs