You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To prevent abuse, we should rate-limit the operations from private gateways across underlying networks (i.e., regardless of whether the message was received via the Internet or couriers).
The following limits should be implemented, with the concrete parameters defined via configuration by the operator:
Number of parcels to or from any given private gateway.
X parcels per gateway per minute.
Y parcels per gateway per hour.
Z parcels per gateway per day.
Ingress and egress network bandwidth per private gateway.
To prevent abuse, we should rate-limit the operations from private gateways across underlying networks (i.e., regardless of whether the message was received via the Internet or couriers).
The following limits should be implemented, with the concrete parameters defined via configuration by the operator:
X
parcels per gateway per minute.Y
parcels per gateway per hour.Z
parcels per gateway per day.X
MiB per gateway per hour.Y
MiB per gateway per day.Z
MiB per gateway per week.System and software stack
Use
rate-limiter-flexible
with a Redis backend.Related issues
The text was updated successfully, but these errors were encountered: