|
Tor
0.4.7.0-alpha-dev
|
Data Fields | |
| AUTOBOOL | DoSConnectionEnabled |
| AUTOBOOL | DoSCircuitCreationEnabled |
| POSINT | DoSCircuitCreationMinConnections |
| POSINT | DoSCircuitCreationRate |
| POSINT | DoSCircuitCreationBurst |
| INT | DoSCircuitCreationDefenseType |
| INTERVAL | DoSCircuitCreationDefenseTimePeriod |
| POSINT | DoSConnectionMaxConcurrentCount |
| INT | DoSConnectionDefenseType |
| AUTOBOOL | DoSRefuseSingleHopClientRendezvous |
| POSINT | DoSConnectionConnectBurst |
| POSINT | DoSConnectionConnectRate |
| INTERVAL | DoSConnectionConnectDefenseTimePeriod |
Definition at line 9 of file dos_options.inc.
| POSINT DoSCircuitCreationBurst |
Maximum allowed burst of circuits. Reaching that value, the address is detected as malicious and a defense might be used.
Definition at line 26 of file dos_options.inc.
| INTERVAL DoSCircuitCreationDefenseTimePeriod |
For how much time (in seconds) the defense is applicable for a malicious address. A random time delta is added to the defense time of an address which will be between 1 second and half of this value.
Definition at line 35 of file dos_options.inc.
| INT DoSCircuitCreationDefenseType |
When an address is marked as malicious, what defense should be used against it. See the dos_cc_defense_type_t enum.
Definition at line 30 of file dos_options.inc.
| AUTOBOOL DoSCircuitCreationEnabled |
Autobool: Is the circuit creation DoS mitigation subsystem enabled?
Definition at line 15 of file dos_options.inc.
| POSINT DoSCircuitCreationMinConnections |
Minimum concurrent connection needed from one single address before any defense is used.
Definition at line 19 of file dos_options.inc.
| POSINT DoSCircuitCreationRate |
Circuit rate used to refill the token bucket.
Definition at line 22 of file dos_options.inc.
| POSINT DoSConnectionConnectBurst |
Allowed burst of client connection allowed per address.
Definition at line 48 of file dos_options.inc.
| INTERVAL DoSConnectionConnectDefenseTimePeriod |
For how much time (in seconds) the connection connect rate defense is applicable for a malicious address. A random time delta is added to the defense time of an address which will be between 1 second and half of this value.
Definition at line 57 of file dos_options.inc.
| POSINT DoSConnectionConnectRate |
Allowed rate of client connection allowed per address.
Definition at line 51 of file dos_options.inc.
| INT DoSConnectionDefenseType |
When an address is reaches the maximum count, what defense should be used against it. See the dos_conn_defense_type_t enum.
Definition at line 42 of file dos_options.inc.
| AUTOBOOL DoSConnectionEnabled |
Autobool: Is the DoS connection mitigation subsystem enabled?
Definition at line 12 of file dos_options.inc.
| POSINT DoSConnectionMaxConcurrentCount |
Maximum concurrent connection allowed per address.
Definition at line 38 of file dos_options.inc.
| AUTOBOOL DoSRefuseSingleHopClientRendezvous |
Autobool: Do we refuse single hop client rendezvous?
Definition at line 45 of file dos_options.inc.