diff options
author | Nick Mathewson <nickm@torproject.org> | 2018-02-09 15:58:26 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2018-02-09 15:58:26 -0500 |
commit | e5d78c70b00a2afe1c4f98638ce53315be141789 (patch) | |
tree | 434875c7ee844a1443a463f4c3ca06c4137c7cff /changes/ticket24902 | |
parent | abdf2a6f7f400bf7769b701c79b51e51f1cc9e55 (diff) | |
download | tor-e5d78c70b00a2afe1c4f98638ce53315be141789.tar.gz tor-e5d78c70b00a2afe1c4f98638ce53315be141789.zip |
Begin work on a changelog
Diffstat (limited to 'changes/ticket24902')
-rw-r--r-- | changes/ticket24902 | 13 |
1 files changed, 0 insertions, 13 deletions
diff --git a/changes/ticket24902 b/changes/ticket24902 deleted file mode 100644 index 1a2ef95cc9..0000000000 --- a/changes/ticket24902 +++ /dev/null @@ -1,13 +0,0 @@ - o Major features (denial of service mitigation): - - Give relays some defenses against the recent network overload. We start - with three defenses (default parameters in parentheses). First: if a - single client address makes too many concurrent connections (>100), hang - up on further connections. Second: if a single client address makes - circuits too quickly (more than 3 per second, with an allowed burst of - 90) while also having too many connections open (3), refuse new create - cells for the next while (1-2 hours). Third: if a client asks to - establish a rendezvous point to you directly, ignore the request. These - defenses can be manually controlled by new torrc options, but relays - will also take guidance from consensus parameters, so there's no need to - configure anything manually. Implements ticket 24902. - |