[tor-bugs] #7823 [Flashproxy]: Rate-limit facilitator interaction
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sat Apr 27 07:34:38 UTC 2013
#7823: Rate-limit facilitator interaction
------------------------+---------------------------------------------------
Reporter: dcf | Owner: dcf
Type: defect | Status: new
Priority: major | Milestone:
Component: Flashproxy | Version:
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by dcf):
Replying to [comment:1 aallai]:
> There is an apache mod, mod_evasive, that does rate-limiting against
general DoS attacks. It looks
>
> pretty easy to set up and configure.
>
> http://www.zdziarski.com/blog/?page_id=442
Thanks, this is a good idea. I added mod_evasive to the facilitator setup
instructions and we'll see how it goes.
I would like rate limiting to happen not only at the CGI layer. I also
want it to happen at the level of the `facilitator` program, which has
knowledge of the current recommended proxy polling interval. If proxies
are supposed to be polling every 10 minutes, it should refuse to serve
proxies polling more frequently than that.
A vague plan of mine is to allow certain trusted parties to push as many
registrations as they want through the CGI. This is if someone we trust
sets up their own rendezvous system and they want to post their
registrations to us. We should introduce authenticated registrations,
where if a registration has a good signature from a trusted public key, it
is not subject to rate limiting. If we use mod_evasive, we may have to
maintain IP whitelists to prevent rate limiting of trusted registrants at
the Apache level.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7823#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list