Daniel Micay b38736ca74 enable nftables-based DDoS protection for all TCP services
Now that the usage of synproxy is gated behind a SYN packet rate limit,
we can expand this to all our TCP services to have always enabled DDoS
protection instead of needing to deploy a stricter set of rules when the
servers are under attack. This is far better because there isn't always
a system administrator available to handle an ongoing attack.

We already used per-IP connection limits in nginx across the board but
those limits are applied far too late after a TLS connection has been
established and headers are sent rather than before. Using IPv6 /64
blocks means this is much more aggressive for IPv6, but many clients
will fall back to IPv4 due to the happy eyeballs approach. The nginx
limits are still useful due to HTTP/2 multiplexing and we'll need to
think over how to address IPv6 there.
2024-04-10 14:48:10 -04:00
2021-07-19 23:02:29 -04:00
2023-05-07 00:02:51 -04:00
2024-02-03 17:48:56 -05:00
2024-03-31 14:03:16 -04:00
2023-07-16 01:25:27 -04:00
2024-02-24 19:19:59 -05:00
2024-03-06 16:53:42 -05:00
2024-01-03 10:18:15 -05:00
2023-07-18 16:41:39 -04:00
2021-07-28 08:23:04 -04:00
2024-03-18 21:10:47 -04:00
2024-03-14 15:48:53 -04:00
2024-01-25 01:57:18 -05:00
2023-01-10 14:09:06 -05:00
2023-07-16 01:25:27 -04:00
2023-07-03 18:35:43 -04:00
2023-07-03 18:35:43 -04:00
2023-07-18 16:58:34 -04:00
2021-12-16 12:43:34 -05:00
2024-02-23 13:04:36 -05:00
2022-07-03 09:05:41 -04:00
2023-07-06 22:12:26 -04:00
2023-10-04 10:26:16 -04:00

Information about GrapheneOS servers is available in the GrapheneOS servers article on grapheneos.org.

Description
Languages
Shell 52.3%
Vim Script 43.9%
Python 2.4%
Erlang 1.4%