User Tools

Site Tools


en:resource_limiting_with_etc_login.conf_5

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
en:resource_limiting_with_etc_login.conf_5 [2018/02/05 21:53]
gman999
en:resource_limiting_with_etc_login.conf_5 [2018/02/05 22:37] (current)
gman999
Line 1: Line 1:
 ====Limiting Tor Resource Usage with login.conf==== ====Limiting Tor Resource Usage with login.conf====
  
-It's good mitigation protocol to limit resources on high-profile ​and frequently targeted daemons.+It's good mitigation protocol to limit resources on high-profile ​internet services.
  
-Tor relays, in particular, often face extraordinary and particular ​attacks, like the memory-consuming attack in December 2017 which harshly ​deprecated the network.+Tor relays, in particular, often face extraordinary and targeted ​attacks, like the memory-consuming attack in December 2017 which harshly ​impacted [[https://​metrics.torproject.org/​relayflags.html?​start=2017-12-01&​end=2018-01-01&​flag=HSDir|HSDir-flagged relays]].
  
-The standard host-based method to inhibit denial-of-service by resource ​hogging ​is by setting limits by login class.+The standard host-based method to inhibit denial-of-service by resource ​consumption ​is by setting limits by login class.
  
-Specifically,​ the login.conf(5) file allows limits to be set to the tor daemon.+Specifically,​ the /etc/login.conf(5) file allows limits to be set to the tor daemon.
  
 In this case, the _tor user will be restricted to only using 2Gb of memory. In this case, the _tor user will be restricted to only using 2Gb of memory.
en/resource_limiting_with_etc_login.conf_5.txt ยท Last modified: 2018/02/05 22:37 by gman999