When running a DHT relay as a service, the service is currently susceptible to DoS attacks as a bad actor can easily saturate the relay. We should provide some sort of configurable QoS controls to allow relay operators to mitigate this.
Some initial ideas:
Configurable per-connection usage limits, such as limits on the number of open servers and connections, active queries, etc.
Hooks to allow/deny all actions that allocate resources, such as opening a server or a connection, running a query, etc.
When running a DHT relay as a service, the service is currently susceptible to DoS attacks as a bad actor can easily saturate the relay. We should provide some sort of configurable QoS controls to allow relay operators to mitigate this.
Some initial ideas:
Configurable per-connection usage limits, such as limits on the number of open servers and connections, active queries, etc.
Hooks to allow/deny all actions that allocate resources, such as opening a server or a connection, running a query, etc.