[tor-bugs] #2668 [Core Tor/Tor]: Rate limit RELAY_EARLY and TLS by IP

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Feb 23 17:45:34 UTC 2018


#2668: Rate limit RELAY_EARLY and TLS by IP
--------------------------------+----------------------------------
 Reporter:  mikeperry           |          Owner:  (none)
     Type:  defect              |         Status:  closed
 Priority:  Medium              |      Milestone:  Tor: unspecified
Component:  Core Tor/Tor        |        Version:  Tor: 0.2.7
 Severity:  Normal              |     Resolution:  fixed
 Keywords:  tor-relay, tor-dos  |  Actual Points:
Parent ID:                      |         Points:  3
 Reviewer:                      |        Sponsor:
--------------------------------+----------------------------------
Changes (by dgoulet):

 * status:  new => closed
 * resolution:   => fixed


Comment:

 I think this also falls under #24902 which limits concurrent connection
 per client IP address. The detection takes place *after* the TLS
 negotiation since it is only at that point that we know if the client has
 to be considered a client or relay.

 #24767 will also helps by not making relays DoS each other in case the TCP
 connection fails between relays.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/2668#comment:26>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list