Tor  0.4.7.0-alpha-dev
Data Fields
dos_options_t Struct Reference

Data Fields

AUTOBOOL DoSConnectionEnabled
 
AUTOBOOL DoSCircuitCreationEnabled
 
POSINT DoSCircuitCreationMinConnections
 
POSINT DoSCircuitCreationRate
 
POSINT DoSCircuitCreationBurst
 
INT DoSCircuitCreationDefenseType
 
INTERVAL DoSCircuitCreationDefenseTimePeriod
 
POSINT DoSConnectionMaxConcurrentCount
 
INT DoSConnectionDefenseType
 
AUTOBOOL DoSRefuseSingleHopClientRendezvous
 
POSINT DoSConnectionConnectBurst
 
POSINT DoSConnectionConnectRate
 
INTERVAL DoSConnectionConnectDefenseTimePeriod
 

Detailed Description

Definition at line 9 of file dos_options.inc.

Field Documentation

◆ DoSCircuitCreationBurst

POSINT DoSCircuitCreationBurst

Maximum allowed burst of circuits. Reaching that value, the address is detected as malicious and a defense might be used.

Definition at line 26 of file dos_options.inc.

◆ DoSCircuitCreationDefenseTimePeriod

INTERVAL DoSCircuitCreationDefenseTimePeriod

For how much time (in seconds) the defense is applicable for a malicious address. A random time delta is added to the defense time of an address which will be between 1 second and half of this value.

Definition at line 35 of file dos_options.inc.

◆ DoSCircuitCreationDefenseType

INT DoSCircuitCreationDefenseType

When an address is marked as malicious, what defense should be used against it. See the dos_cc_defense_type_t enum.

Definition at line 30 of file dos_options.inc.

◆ DoSCircuitCreationEnabled

AUTOBOOL DoSCircuitCreationEnabled

Autobool: Is the circuit creation DoS mitigation subsystem enabled?

Definition at line 15 of file dos_options.inc.

◆ DoSCircuitCreationMinConnections

POSINT DoSCircuitCreationMinConnections

Minimum concurrent connection needed from one single address before any defense is used.

Definition at line 19 of file dos_options.inc.

◆ DoSCircuitCreationRate

POSINT DoSCircuitCreationRate

Circuit rate used to refill the token bucket.

Definition at line 22 of file dos_options.inc.

◆ DoSConnectionConnectBurst

POSINT DoSConnectionConnectBurst

Allowed burst of client connection allowed per address.

Definition at line 48 of file dos_options.inc.

◆ DoSConnectionConnectDefenseTimePeriod

INTERVAL DoSConnectionConnectDefenseTimePeriod

For how much time (in seconds) the connection connect rate defense is applicable for a malicious address. A random time delta is added to the defense time of an address which will be between 1 second and half of this value.

Definition at line 57 of file dos_options.inc.

◆ DoSConnectionConnectRate

POSINT DoSConnectionConnectRate

Allowed rate of client connection allowed per address.

Definition at line 51 of file dos_options.inc.

◆ DoSConnectionDefenseType

INT DoSConnectionDefenseType

When an address is reaches the maximum count, what defense should be used against it. See the dos_conn_defense_type_t enum.

Definition at line 42 of file dos_options.inc.

◆ DoSConnectionEnabled

AUTOBOOL DoSConnectionEnabled

Autobool: Is the DoS connection mitigation subsystem enabled?

Definition at line 12 of file dos_options.inc.

◆ DoSConnectionMaxConcurrentCount

POSINT DoSConnectionMaxConcurrentCount

Maximum concurrent connection allowed per address.

Definition at line 38 of file dos_options.inc.

◆ DoSRefuseSingleHopClientRendezvous

AUTOBOOL DoSRefuseSingleHopClientRendezvous

Autobool: Do we refuse single hop client rendezvous?

Definition at line 45 of file dos_options.inc.


The documentation for this struct was generated from the following file: