|
@@ -2765,7 +2765,7 @@ Denial of Service mitigation subsystem.
|
|
address is positively identified, tor will activate defenses against the
|
|
address is positively identified, tor will activate defenses against the
|
|
address. See the DoSCircuitCreationDefenseType option for more details.
|
|
address. See the DoSCircuitCreationDefenseType option for more details.
|
|
This is a client to relay detection only. "auto" means use the consensus
|
|
This is a client to relay detection only. "auto" means use the consensus
|
|
- parameter.
|
|
|
|
|
|
+ parameter. If not defined in the consensus, the value is 0.
|
|
(Default: auto)
|
|
(Default: auto)
|
|
|
|
|
|
[[DoSCircuitCreationMinConnections]] **DoSCircuitCreationMinConnections** __NUM__::
|
|
[[DoSCircuitCreationMinConnections]] **DoSCircuitCreationMinConnections** __NUM__::
|
|
@@ -2774,19 +2774,22 @@ Denial of Service mitigation subsystem.
|
|
flagged as executing a circuit creation DoS. In other words, once a client
|
|
flagged as executing a circuit creation DoS. In other words, once a client
|
|
address reaches the circuit rate and has a minimum of NUM concurrent
|
|
address reaches the circuit rate and has a minimum of NUM concurrent
|
|
connections, a detection is positive. "0" means use the consensus
|
|
connections, a detection is positive. "0" means use the consensus
|
|
- parameter.
|
|
|
|
|
|
+ parameter. If not defined in the consensus, the value is 3.
|
|
(Default: 0)
|
|
(Default: 0)
|
|
|
|
|
|
[[DoSCircuitCreationRate]] **DoSCircuitCreationRate** __NUM__::
|
|
[[DoSCircuitCreationRate]] **DoSCircuitCreationRate** __NUM__::
|
|
|
|
|
|
The allowed circuit creation rate per second applied per client IP
|
|
The allowed circuit creation rate per second applied per client IP
|
|
- address. If this option is 0, it obeys a consensus parameter. (Default: 0)
|
|
|
|
|
|
+ address. If this option is 0, it obeys a consensus parameter. If not
|
|
|
|
+ defined in the consensus, the value is 3.
|
|
|
|
+ (Default: 0)
|
|
|
|
|
|
[[DoSCircuitCreationBurst]] **DoSCircuitCreationBurst** __NUM__::
|
|
[[DoSCircuitCreationBurst]] **DoSCircuitCreationBurst** __NUM__::
|
|
|
|
|
|
The allowed circuit creation burst per client IP address. If the circuit
|
|
The allowed circuit creation burst per client IP address. If the circuit
|
|
rate and the burst are reached, a client is marked as executing a circuit
|
|
rate and the burst are reached, a client is marked as executing a circuit
|
|
- creation DoS. "0" means use the consensus parameter.
|
|
|
|
|
|
+ creation DoS. "0" means use the consensus parameter. If not defined in the
|
|
|
|
+ consensus, the value is 90.
|
|
(Default: 0)
|
|
(Default: 0)
|
|
|
|
|
|
[[DoSCircuitCreationDefenseType]] **DoSCircuitCreationDefenseType** __NUM__::
|
|
[[DoSCircuitCreationDefenseType]] **DoSCircuitCreationDefenseType** __NUM__::
|
|
@@ -2797,28 +2800,31 @@ Denial of Service mitigation subsystem.
|
|
1: No defense.
|
|
1: No defense.
|
|
2: Refuse circuit creation for the DoSCircuitCreationDefenseTimePeriod period of time.
|
|
2: Refuse circuit creation for the DoSCircuitCreationDefenseTimePeriod period of time.
|
|
+
|
|
+
|
|
- "0" means use the consensus parameter.
|
|
|
|
|
|
+ "0" means use the consensus parameter. If not defined in the consensus,
|
|
|
|
+ the value is 2.
|
|
(Default: 0)
|
|
(Default: 0)
|
|
|
|
|
|
-[[DoSCircuitCreationDefenseTimePeriod]] **DoSCircuitCreationDefenseTimePeriod** __NUM__::
|
|
|
|
|
|
+[[DoSCircuitCreationDefenseTimePeriod]] **DoSCircuitCreationDefenseTimePeriod** __N__ **seconds**|**minutes**|**hours**::
|
|
|
|
|
|
- The base time period that the DoS defense is activated for. The actual
|
|
|
|
- value is selected randomly for each activation from NUM+1 to 3/2 * NUM.
|
|
|
|
- "0" means use the consensus parameter.
|
|
|
|
- (Default: 0)
|
|
|
|
|
|
+ The base time period in seconds that the DoS defense is activated for. The
|
|
|
|
+ actual value is selected randomly for each activation from N+1 to 3/2 * N.
|
|
|
|
+ "0" means use the consensus parameter. If not defined in the consensus,
|
|
|
|
+ the value is 3600 seconds (1 hour). (Default: 0)
|
|
|
|
|
|
[[DoSConnectionEnabled]] **DoSConnectionEnabled** **0**|**1**|**auto**::
|
|
[[DoSConnectionEnabled]] **DoSConnectionEnabled** **0**|**1**|**auto**::
|
|
|
|
|
|
Enable the connection DoS mitigation. For client address only, this allows
|
|
Enable the connection DoS mitigation. For client address only, this allows
|
|
tor to mitigate against large number of concurrent connections made by a
|
|
tor to mitigate against large number of concurrent connections made by a
|
|
- single IP address. "auto" means use the consensus parameter.
|
|
|
|
|
|
+ single IP address. "auto" means use the consensus parameter. If not
|
|
|
|
+ defined in the consensus, the value is 0.
|
|
(Default: auto)
|
|
(Default: auto)
|
|
|
|
|
|
[[DoSConnectionMaxConcurrentCount]] **DoSConnectionMaxConcurrentCount** __NUM__::
|
|
[[DoSConnectionMaxConcurrentCount]] **DoSConnectionMaxConcurrentCount** __NUM__::
|
|
|
|
|
|
The maximum threshold of concurrent connection from a client IP address.
|
|
The maximum threshold of concurrent connection from a client IP address.
|
|
Above this limit, a defense selected by DoSConnectionDefenseType is
|
|
Above this limit, a defense selected by DoSConnectionDefenseType is
|
|
- applied. "0" means use the consensus parameter.
|
|
|
|
|
|
+ applied. "0" means use the consensus parameter. If not defined in the
|
|
|
|
+ consensus, the value is 100.
|
|
(Default: 0)
|
|
(Default: 0)
|
|
|
|
|
|
[[DoSConnectionDefenseType]] **DoSConnectionDefenseType** __NUM__::
|
|
[[DoSConnectionDefenseType]] **DoSConnectionDefenseType** __NUM__::
|
|
@@ -2829,7 +2835,8 @@ Denial of Service mitigation subsystem.
|
|
1: No defense.
|
|
1: No defense.
|
|
2: Immediately close new connections.
|
|
2: Immediately close new connections.
|
|
+
|
|
+
|
|
- "0" means use the consensus parameter.
|
|
|
|
|
|
+ "0" means use the consensus parameter. If not defined in the consensus,
|
|
|
|
+ the value is 2.
|
|
(Default: 0)
|
|
(Default: 0)
|
|
|
|
|
|
[[DoSRefuseSingleHopClientRendezvous]] **DoSRefuseSingleHopClientRendezvous** **0**|**1**|**auto**::
|
|
[[DoSRefuseSingleHopClientRendezvous]] **DoSRefuseSingleHopClientRendezvous** **0**|**1**|**auto**::
|
|
@@ -2837,7 +2844,7 @@ Denial of Service mitigation subsystem.
|
|
Refuse establishment of rendezvous points for single hop clients. In other
|
|
Refuse establishment of rendezvous points for single hop clients. In other
|
|
words, if a client directly connects to the relay and sends an
|
|
words, if a client directly connects to the relay and sends an
|
|
ESTABLISH_RENDEZVOUS cell, it is silently dropped. "auto" means use the
|
|
ESTABLISH_RENDEZVOUS cell, it is silently dropped. "auto" means use the
|
|
- consensus parameter.
|
|
|
|
|
|
+ consensus parameter. If not defined in the consensus, the value is 0.
|
|
(Default: auto)
|
|
(Default: auto)
|
|
|
|
|
|
TESTING NETWORK OPTIONS
|
|
TESTING NETWORK OPTIONS
|