DoS mitigation parameters
Denial-of-Service (DoS) Protection
Last updated
Was this helpful?
Denial-of-Service (DoS) Protection
Last updated
Was this helpful?
Anyone relays, especially exit and directory relays, are vulnerable to DoS attacks that can degrade performance or disrupt services. Anon provides built-in DoS mitigation options to protect relays from excessive circuit creation, connection flooding, or stream abuse.
Below are some parameters that can be configured in your anonrc
file for enhanced protection.
Protects your relay from excessive circuit creation attempts.
Limits the rate and number of incoming connections to avoid exhaustion.
Protects against exit traffic generating too many streams per circuit.
Protects your hidden service from introduction/rendezvous DoS attacks.
If you're running any type of relay, you can disallow single-hop client circuits to further reduce abuse, but it's completely optional.
For a better understanding of DoS mitigation strategies and configurations, please refer to the Anon Manual under
The manual offers technical explanations and guidance to help you tailor your relay's defenses effectively.