GrapheneOS on Nostr: To prevent conntrack table exhaustion, we're using synproxy for SYN packets above a ...
To prevent conntrack table exhaustion, we're using synproxy for SYN packets above a rate limit of 1024/second with 128 burst.
To prevent abusing connections limits or filling the sets enforcing them, we're only counting successfully established connections towards the limits.
Published at
2024-04-16 15:03:08Event JSON
{
"id": "96487e0bccd3284bf6e82a9efceb16c649e3b00ad5f92150e7638a217a024494",
"pubkey": "5468bceeb74ce35cb4173dcc9974bddac9e894a74bf3d44f9ca8b7554605c9ed",
"created_at": 1713279788,
"kind": 1,
"tags": [
[
"e",
"0d5ae3e873e4c5485d4b9697afb3b57d2187859cf374245f1ff1fc9a1b27a6c0",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://grapheneos.social/users/GrapheneOS/statuses/112281504240904035",
"activitypub"
]
],
"content": "To prevent conntrack table exhaustion, we're using synproxy for SYN packets above a rate limit of 1024/second with 128 burst.\n\nTo prevent abusing connections limits or filling the sets enforcing them, we're only counting successfully established connections towards the limits.",
"sig": "033fe38802f53297eafaf7255e02630daedb19ec122240c46eb017fbbeb7edac102021e20f515f245279cbfa19ac4511ff01c3bad54655c75497bac00ba77fa3"
}