Query syntax:

  • Use tag1 tag2 to match all tags.
  • tag1 or tag2 will match any tag.
  • Negate a tag with -tag1.
  • Group sub-queries with (tag1 or tag2).
  • Quote strings to include special characters.
  • Restrict search to a specific realm with realm:wiki.

Showing objects tagged with 'tor-dos'

  • #469 defect: please limit connections by client (needs_revision)
  • #925 defect: Tor fails badly when accept(2) returns EMFILE or ENFILE (new)
  • #2664 enhancement: DoS and failure resistence improvements (new)
  • #2668 defect: Rate limit RELAY_EARLY and TLS by IP (closed: fixed)
  • #3029 enhancement: We should save received documents before parsing them (new)
  • #3847 enhancement: Provide ability to round robin outgoing exit connections on multiple ... (new)
  • #4580 defect: Some Tor clients go nuts requesting the consensus if there is no ... (new)
  • #4581 defect: Dir auths should defend themselves from too many begindir requests per ... (needs_revision)
  • #6777 defect: add config option to not rate limit authority dir conns (new)
  • #7572 defect: Make relay crypto run on multiple CPU cores (assigned)
  • #13737 enhancement: Move circuit building crypto to worker (assigned)
  • #15251 task: Make tor support starting with 10.000 Tor Hidden Service (new)
  • #15463 defect: Tor deals poorly with a very large number of incoming connection requests. (new)
  • #15516 enhancement: Consider dropping INTRODUCE2 cells when under load (new)
  • #17640 enhancement: Handle CREATE/CREATED cell processing gracefully under load. (assigned)
  • #17806 enhancement: Make onion queues rational, combine with workqueue logic. (new)
  • #18320 enhancement: Clear old entries from the key-pinning journal file (new)
  • #18346 enhancement: Separate the various roles that directory authorities play, from a ... (accepted)
  • #18635 project: Make a design for circuit- migration in the event of DoS (new)
  • #18636 project: Write sub-proposals for each part of prop257: Refactoring authorities. ... (accepted)
  • #18637 enhancement: Have OOM handler look at all memory consumption, not just some (accepted)
  • #18638 task: Write a proposal for PK handshake that uses more client resources than ... (assigned)
  • #18641 enhancement: Teach the OOM handler about uploaded descriptors on a dirauth. (assigned)
  • #18642 enhancement: Teach the OOM handler about the DNS cache (closed: implemented)
  • #18643 enhancement: Replace the most error-prone binary parsers with trunnel (new)
  • #18644 task: Replace our routerparse.c core with something machine-generated (new)
  • #18645 task: Replace our http parser with something machine-generated (new)
  • #18646 enhancement: Generalize our OOM-handler to an OODisk handler (new)
  • #18647 enhancement: When low on BW, limit the total fraction used to answer directory requests (new)
  • #18852 defect: Directory mirrors should check accounting usage more frequently (new)
  • #19304 task: Write a proposal for having dirauths push to fallbacks, rather than pull. (new)
  • #19305 task: Write a proposal for separating "upload descriptors here" from the ... (new)
  • #19306 task: Write a proposal for removing liveness-testing from dirauths. (new)
  • #19328 defect: Try not to log from inside functions called from inside log functions (closed: duplicate)
  • #19377 task: Consider retry/backoff behavior when building new circuits (new)
  • #19984 defect: Use a better set of comparison/evaluation functions for deciding which ... (accepted)
  • #24298 defect: Better handling of DoS attacks on onion services (new)
  • #24299 defect: Allow onion services to distinguish clients from each other (closed: duplicate)
  • #24767 enhancement: All relays are constantly connecting to down relays and failing over ... (closed: fixed)
  • #24782 defect: Set a lower default MaxMemInQueues value (closed: fixed)
  • #24797 enhancement: Add an option that makes Tor use fewer connections (needs_revision)
  • #24815 defect: Validate shared random state dates before each voting period (assigned)
  • #24849 defect: Added -1 signatures to consensus (closed: fixed)
  • #24902 enhancement: Denial of Service mitigation subsystem (closed: fixed)
  • #24962 enhancement: Tor2web denial of service issues (new)
  • #24963 enhancement: dos: Add an option to block tor2web requests at the intro point (new)
  • #24964 defect: dos: Add an option to block tor2web requests at the HSDir (new)
  • #24973 defect: Tor should be more gentle when launching dozens of circuits at once (needs_information)
  • #25094 defect: 24902 fix breaks on clang (closed: fixed)
  • #25095 task: Update dir-spec.txt with recent consensus param additions (closed: fixed)
  • #25122 enhancement: geoip: Hook the client geoip cache into the OOM handler (closed: implemented)
  • #25128 defect: Bug: src/or/dos.c:312: cc_stats_refill_bucket: Non-fatal assertion ... (closed: fixed)
  • #25141 defect: enabling CellStatistics results in gigabytes of incremental memory ... (new)
  • #25183 defect: Implement a way to tell if an IP address is a known relay (closed: fixed)
  • #25193 defect: dos: Avoid blacklisting Exit relays (closed: fixed)
  • #25202 defect: Check the calculations in cc_stats_refill_bucket using non fatal assertions (closed: fixed)
  • #25223 defect: dos: dos_new_client_conn: Non-fatal assertion !(entry == NULL) failed (closed: fixed)
  • #25226 defect: Circuit cell queue can fill up memory (closed: implemented)
  • #25236 defect: dos: Document torrc default values in the man page when not in the ... (closed: fixed)
  • #25248 enhancement: DoS mitgation: improve documentation (closed: implemented)
  • #25372 defect: relay: Allocation for compression goes very high (new)
  • #25824 enhancement: Integrate circuit max_cell_queue_size killer with DoS heartbeats (closed: implemented)
  • #26294 defect: attacker can force intro point rotation by ddos (new)
  • #27921 enhancement: apparent DOS / impairment-of-service against FallbackDirs using DIR ... (new)
  • #28367 enhancement: RFE additional DOS mitigations for exits (closed: duplicate)
  • #28511 defect: Limit the number of open testing circuits, and the total number of ... (new)
  • #28514 defect: Open NUM_PARALLEL_TESTING_CIRCS when a bandwidth test is initiated (new)