Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-15 Thread teor
> On 16 Aug 2019, at 04:52, Pop Chunhapanya wrote: > > Hi Tim, > >> The only protocol supported right now 'haproxy'. This option is only for >> clients. (Default: none) > > I think TCPProxy option is more generic than HTTPSProxy, Socks4Proxy and > Socks5Proxy. Why don't we also allow https,

Re: [tor-dev] [prop305] Introduction Point Behavior

2019-08-15 Thread teor
Hi David, > On 15 Aug 2019, at 22:56, David Goulet wrote: > > I'm leaning towards not closing the circuit and falling back on the consensus > parameters. Using the consensus parameters seems like a good thing to do. We can say "valid parameters override the consensus parameters. Invalid parame

Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-15 Thread Pop Chunhapanya
Hi Tim, The only protocol supported right now 'haproxy'. This option is only for > clients. (Default: none) > I think TCPProxy option is more generic than HTTPSProxy, Socks4Proxy and Socks5Proxy. Why don't we also allow https, socks4, and socks5 instead of just haproxy? __

[tor-dev] [prop305] Introduction Point Behavior

2019-08-15 Thread David Goulet
Greetings, This is part of the many discussions about proposal 305 which is the ESTABLISH_INTRO DoS defenses cell extension. Implementation is close to done and under review in ticket #30924. However, there is one part that is yet to be cleared out. asn and I thought it would be better to bring i

Re: [tor-dev] Putting onion services behind a third-party TCP proxy

2019-08-15 Thread teor
Hi Haxxpop, > On 15 Aug 2019, at 16:53, Pop Chunhapanya wrote: > > >>> So I'm thinking putting the tor daemon behind some third party TCP proxy >>> that will protect me from this kind of DDoS attack. >>> >>> What do you think if I want to implement a feature that forward all the >>> onion se