diff options
author | Nick Mathewson <nickm@torproject.org> | 2021-02-23 08:43:19 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2021-02-23 08:43:19 -0500 |
commit | 100221baac7e0c0533df009d5b65eae27af12123 (patch) | |
tree | 03fcdca93d32832786827e97465231379929384f /doc/man/tor.1.txt | |
parent | 09614e0c9db1d65c5f59c3a32c517f115b509021 (diff) | |
parent | 83ab6adb10d4e6e10eccbbb65120d3e9f1a675f6 (diff) | |
download | tor-100221baac7e0c0533df009d5b65eae27af12123.tar.gz tor-100221baac7e0c0533df009d5b65eae27af12123.zip |
Merge remote-tracking branch 'origin/master'
Diffstat (limited to 'doc/man/tor.1.txt')
-rw-r--r-- | doc/man/tor.1.txt | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/doc/man/tor.1.txt b/doc/man/tor.1.txt index d51183e04a..9bc7efc788 100644 --- a/doc/man/tor.1.txt +++ b/doc/man/tor.1.txt @@ -2941,6 +2941,30 @@ Denial of Service mitigation subsystem described above. consensus, the value is 100. (Default: 0) +[[DoSConnectionConnectRate]] **DoSConnectionConnectRate** __NUM__:: + + The allowed rate of client connection from a single address per second. + Coupled with the burst (see below), if the limit is reached, the address + is marked and a defense is applied (DoSConnectionDefenseType) for a period + of time defined by DoSConnectionConnectDefenseTimePeriod. If not defined + or set to 0, it is controlled by a consensus parameter. + (Default: 0) + +[[DoSConnectionConnectBurst]] **DoSConnectionConnectBurst** __NUM__:: + + The allowed burst of client connection from a single address per second. + See the DoSConnectionConnectRate for more details on this detection. If + not defined or set to 0, it is controlled by a consensus parameter. + (Default: 0) + +[[DoSConnectionConnectDefenseTimePeriod]] **DoSConnectionConnectDefenseTimePeriod** __N__ **seconds**|**minutes**|**hours**:: + + The base time period in seconds that the client connection defense is + activated for. The actual value is selected randomly for each activation + from N+1 to 3/2 * N. If not defined or set to 0, it is controlled by a + consensus parameter. + (Default: 24 hours) + [[DoSRefuseSingleHopClientRendezvous]] **DoSRefuseSingleHopClientRendezvous** **0**|**1**|**auto**:: Refuse establishment of rendezvous points for single hop clients. In other |