On 2/16/18 12:23, nusenu wrote:
I was wondering if these unfriendly tor clients are using tor's default path selection or something else.
If they do tor exit relays would have much smaller values in their DoS stats, right?
Would any tor exit operator (listed bellow) running 0.3.3.2-alpha be willing to share (obfuscated/not exact counters) of their DoS log entries? (only if you do not have any additional firewall rules filtering packets)
I run an 0332-alpha relay with no extra firewall rules.
4B084AD6A0BA70761A333829F52042BB6EA009AF
In case the following gets wrapped and ruined: https://paste.debian.net/1010648/
Feb 16 01:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 5x v1 connections, 1xx v2 connections, 9xx v3 connections, and 4xxxxx v4 connections. Feb 16 01:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 2xx single hop clients refused. Feb 16 07:50:55.000 [notice] Heartbeat: Tor's uptime is 5 days 23:28 hours, with 4xxx circuits open. I've sent 1xxx GB and received 1xxx GB. Feb 16 07:50:55.000 [notice] Circuit handshake stats since last time: 4xxx/4xxx TAP, 1xxxxx/1xxxxx NTor. Feb 16 07:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 7x v1 connections, 1xx v2 connections, 9xx v3 connections, and 4xxxxx v4 connections. Feb 16 07:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 3xx single hop clients refused. Feb 16 13:50:55.000 [notice] Heartbeat: Tor's uptime is 6 days 5:28 hours, with 4xxx circuits open. I've sent 1xxx GB and received 1xxx GB. Feb 16 13:50:55.000 [notice] Circuit handshake stats since last time: 4xxx/4xxx TAP, 1xxxxx/1xxxxx NTor. Feb 16 13:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 7x v1 connections, 1xx v2 connections, 1xxx v3 connections, and 4xxxxx v4 connections. Feb 16 13:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 3xx single hop clients refused.