
Hey guys, Do you have any solution to stop the spam caused by tor: The IPv4 ORPort address 127.0.0.1 does not match the descriptor address <IP>. If you have a static public IPv4 address, use 'Address <IPv4>' and 'OutboundBindAddress <IPv4>'. Indeed I have a static IP but behind nat, so defining it in torrc is not possible as it can't bind to it.

On 15/11/2024 13:01, Dionysios K. wrote:
Hey guys,
Do you have any solution to stop the spam caused by tor:
The IPv4 ORPort address 127.0.0.1 does not match the descriptor address <IP>. If you have a static public IPv4 address, use 'Address <IPv4>' and 'OutboundBindAddress <IPv4>'.
Indeed I have a static IP but behind nat, so defining it in torrc is not possible as it can't bind to it.
You can use: Address 123.45.67.89 # Your public IP or DNS name ORPort 1234 NoListen # port number on the public IP address, set up DNAT to forward this to your Tor relay ORPort 10.1.2.3:4567 NoAdvertise # The local IP address and port behind the NAT - this is what the relay will bind ORPort [2001:dead:beef::1:2:3]:4567 # If you have public IPv6 in your local network then you can add it here Then configure DNAT on your router to forward 123.45.67.89:1234 to 10.1.2.3:4567

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Great tip Thank you! :) - ------ Original Message ------ From "Chris Kerr" <chris.kerr@mykolab.ch> To tor-relays@lists.torproject.org Date 18/11/2024 5:45:28 μμ Subject [tor-relays] Re: Journal warnings spam
On 15/11/2024 13:01, Dionysios K. wrote:
Hey guys,
Do you have any solution to stop the spam caused by tor:
The IPv4 ORPort address 127.0.0.1 does not match the descriptor address <IP>. If you have a static public IPv4 address, use 'Address <IPv4>' and 'OutboundBindAddress <IPv4>'.
Indeed I have a static IP but behind nat, so defining it in torrc is not possible as it can't bind to it.
You can use:
Address 123.45.67.89 # Your public IP or DNS name ORPort 1234 NoListen # port number on the public IP address, set up DNAT to forward this to your Tor relay ORPort 10.1.2.3:4567 NoAdvertise # The local IP address and port behind the NAT - this is what the relay will bind ORPort [2001:dead:beef::1:2:3]:4567 # If you have public IPv6 in your local network then you can add it here
Then configure DNAT on your router to forward 123.45.67.89:1234 to 10.1.2.3:4567
-----BEGIN PGP SIGNATURE----- Version: BouncyCastle.NET Cryptography (net6.0) v2.3.1+45c6b99394 iQJPBAEBCAA5BQJnPJVHMhxEaW9uaXNpb3MgSy4gKFZvbml0c2FuZXRHUikgPGFk bWluQHZvbml0c2FuZXQuZ3I+AAoJEGic3NH2mm1KwpgQAKNR+Wk+zZnTDoETrQZm LnD7Ae0s0xPwRzPjPF1T7IcyGANGvO+ajpjXmL6lxpTbrykJ+0Lipocx6v6JQkSe 4uNp4X+bVCEhw2gNit2P2XvLb3fjFbhm4sAlT0ItEM4nRIQJGew+Zo0trFToq0ga C1js6P68EBPLVElk0Bg0jwcYwgtWAL13M9fwShzvOSnWdz7Ki6t8oD3jbtFKH4nY VO8yZMp96zDPsSjXMmvOic+q/qXTX2+iC+wFF+W2V0MUEkF/eSBQdg4LBc+7BlP5 9YQwvS34BHHFdP+DTSnlq6ZUYa0KglCjfNxi88U+uaQ5b5Brl/mpqzTqi9FxYNFJ NOzlwSaNC9AwZLKtUo89Ka1PC+9dwEQj5Oo0SZaKwJJto2BYcFPAbHyA6+XwKEEF Yn90tta0rDnf6McQmsQ3LSvkTc/ZDhw3DwHnE7z17XsRtLgoOpnpV+bYkGbSAW71 2a8d04x0r/W1Yq2GLP/X0m+OZGTZcw+cBbvBPlH7rE6CwGdtjgRgn27UNqc8+QSz tHZG+cpU/BSP3c4Wpk0Z87RiuiD5YoJq2fT7J5iwVpXUCSzvoLYZwAWKLt3M0eqI WxjFR4KZPWBQb4zVkcKjvbjrFg458jJzgHq8ZY3Yuq0B2VLpivrZMthAK1J9iM3x 1u+LA1NqLIFj/Hx6lf6MaxDh =60Ik -----END PGP SIGNATURE-----
participants (2)
-
Chris Kerr
-
Dionysios K.