tor/changes
David Goulet a2c034d8f5 dos: Apply circuit creation defenses if circ max queue cell reached
This adds two consensus parameters to control the outbound max circuit
queue cell size limit and how many times it is allowed to reach that
limit for a single client IP.

Closes #40680

Signed-off-by: David Goulet <dgoulet@torproject.org>
2022-10-26 14:05:28 -04:00
..
.dummy Add a .dummy file in the changes directory to stop git from removing it 2015-05-11 11:41:48 -04:00
bug40639 ignore families for L2 guard independence 2022-08-09 16:39:26 -04:00
bug40642 Add changes file for bug40642. 2022-08-11 09:26:51 -04:00
bug40644 Changes file for bug 40644. 2022-08-02 18:13:46 +00:00
bug40645 Fix a check, make a netflow padding function more safe. 2022-07-27 09:16:50 -04:00
bug40673 Properly compute cell-drop overload fraction 2022-10-06 00:46:29 -04:00
bug40684 Fix a completely wrong calculation in mach monotime_init_internal() 2022-10-13 13:40:10 -04:00
fallbackdirs-2022-08-11 fallbackdir: Update list generated on August 11, 2022 2022-08-11 09:44:39 -04:00
geoip-2022-08-11 Update geoip files to match ipfire location db, 2022/08/11. 2022-08-11 09:44:32 -04:00
geoip-2022-08-12 geoip: Update geoip files with August 9th, 2022 database 2022-08-12 09:56:50 -04:00
ticket40194 relay: Add connection stats to MetricsPort 2022-10-12 09:25:19 -04:00
ticket40604 conn: Notify btrack subsys on normal OR conn close 2022-08-01 10:58:40 -04:00
ticket40623 relay: Send DESTROY cell instead of TRUNCATED cell 2022-07-26 14:01:21 -04:00
ticket40649 relay: Don't send DESTROY remote reason backward or forward 2022-08-02 15:53:31 -04:00
ticket40652 dirauth: Make voting flag threshold tunable via torrc 2022-08-09 11:01:12 -04:00
ticket40680 dos: Apply circuit creation defenses if circ max queue cell reached 2022-10-26 14:05:28 -04:00