Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
Sorry, slight correction, instead of NIC / network card, I meant the internet connection established by the modem itself. Same for cable and fiber, but those usually have higher download speed, and that's what it comes down to when facing DoS attacks, how many megabytes an attacker needs to put

Re: [tor-relays] DOS Protection mini RFC

2024-08-14 Thread George Hartley via tor-relays
If there is DoS on bridges on domestic connections, or connections with very low throughput, then handling (D)DoS at an application layer becomes futile - it will simply overload the NIC. But for bridges on at least 100MbE ports, this would be a nice addition. On Sunday, August 11th, 2024 at 9:

[tor-relays] DOS Protection mini RFC

2024-08-13 Thread pasture_clubbed242--- via tor-relays
Since it is still all fresh in our heads, I wanted to pitch an idea real fast. No idea if it was covered at a tor meeting at some point. For bridge relay operators, such as those with very low bandwidth, it may be worth it to keep lower-than-consensus-restrictions using the DOS flags here https