Skip to content

GitLab

  • Menu
Projects Groups Snippets
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #25062

Closed (moved)
(moved)
Open
Created Jan 29, 2018 by cypherpunks@cypherpunks

Block offending portscanners

Tor client: If the user tried to connect port 1, then 3, and 4 and all of them failed(3 times in a row), deny connection to destination.onion for 3 minutes.

Tor server: If the port request come from circuit X, and it is trying port 2, 5, and 8, and all of them failed(3 times in a row) deny connection from this circuit; just drop connection.

This guy didn't allowing people from delisting his attacklist: http://zlal32teyptf4tvi.onion/

Portscanning unauthorized servers are illegal. Why scanning tor service is okay?

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking