[tor-relays] Attack on Tor exit and back-up directory server

potlatch potlatch at protonmail.com
Thu Aug 15 18:22:17 UTC 2019


Hello All,
I commented and questioned earlier about significant slowing of one of my Finnish exit relays [1] and potential DoS attack.  I took the server off line and did the best job I could hardening it.  The host does not have DoS protection and uses Xen OpenVZ as his VPS manager.  I was getting "nf_contract: table full, dropping packet." errors by the 1000s.  That's fixed and I'm back on the Tor net now.
One question remains:  At any time I look there are 20-150 Iranian IP addresses trying to access the Tor server.  Their IP range is from 5.113.x.x to 5.126.x.x.  None have hashed fingerprints.  Is it okay to let these guys go?  Can they harm or slow Tor?  Should I ban them?  I'd like to learn from this.
-potlatch

Sent with [ProtonMail](https://protonmail.com) Secure Email.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20190815/0723beee/attachment.html>


More information about the tor-relays mailing list