tor/src/feature/rend
David Goulet 9f738be893 hs: Limit the amount of relayed INTRODUCE2
This commit add the hs_dos.{c|h} file that has the purpose of having the
anti-DoS code for onion services.

At this commit, it only has one which is a function that decides if an
INTRODUCE2 can be sent on the given introduction service circuit (S<->IP)
using a simple token bucket.

The rate per second is 25 and allowed burst to 200.

Basic defenses on #15516.

Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-08-06 07:58:14 -04:00
..
rend_authorized_client_st.h Run "make autostyle." 2019-06-05 09:33:35 -04:00
rend_encoded_v2_service_descriptor_st.h Run "make autostyle." 2019-06-05 09:33:35 -04:00
rend_intro_point_st.h Run "make autostyle." 2019-06-05 09:33:35 -04:00
rend_service_descriptor_st.h Run "make autostyle." 2019-06-05 09:33:35 -04:00
rendcache.c Use safe_mem_is_zero in a few more places. 2019-04-30 14:45:58 -04:00
rendcache.h Bump copyright date to 2019 2019-01-16 12:33:22 -05:00
rendclient.c Don't access rend data after a circuit has been marked for close. 2019-06-05 18:19:44 +03:00
rendclient.h Bump copyright date to 2019 2019-01-16 12:33:22 -05:00
rendcommon.c Revert "hs: Implement a helper to repurpose a circuit" 2019-06-05 11:38:01 -07:00
rendcommon.h Revert "hs: Implement a helper to repurpose a circuit" 2019-06-05 11:38:01 -07:00
rendmid.c hs: Limit the amount of relayed INTRODUCE2 2019-08-06 07:58:14 -04:00
rendmid.h Bump copyright date to 2019 2019-01-16 12:33:22 -05:00
rendparse.c Merge branch 'tor-github/pr/611' 2019-02-26 12:33:23 +02:00
rendparse.h Run "make autostyle." 2019-06-05 09:33:35 -04:00
rendservice.c Revert "Hiding crypt_path_t: Create a constructor for crypt_path_t." 2019-05-03 18:15:26 +03:00
rendservice.h Bump copyright date to 2019 2019-01-16 12:33:22 -05:00