moria1 unreachable from AS202306

Hello! I cannot communicate with moria1 from 78.153.140.44 and it cannot reach my system. I can communicate with the rest of the world. For me, it looks like a firewall is blocking it, as traceroute clearly indicates a different behaviour for ICMP echo request and TCP. I've tried that multiple times. [m@teufel ~]$ traceroute -P tcp -p 9201 128.31.0.39 traceroute to 128.31.0.39 (128.31.0.39), 64 hops max, 40 byte packets 1 gw.hostglobal.plus (78.153.140.1) 0.460 ms 0.427 ms 0.349 ms 2 10.28.1.6 (10.28.1.6) 210.766 ms 353.511 ms 563.838 ms 3 ae8-209.rt.ad.rix.lv.retn.net (87.245.239.26) 25.299 ms 25.264 ms 25.228 ms 4 * ae1-5.rt.irx.fkt.de.retn.net (87.245.232.244) 51.147 ms 52.203 ms 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * [m@teufel ~]$ traceroute -I 128.31.0.39 traceroute to 128.31.0.39 (128.31.0.39), 64 hops max, 48 byte packets 1 gw.hostglobal.plus (78.153.140.1) 0.286 ms 1.231 ms 0.219 ms 2 10.28.1.6 (10.28.1.6) 1041.847 ms 25.035 ms 25.234 ms 3 ae8-209.rt.ad.rix.lv.retn.net (87.245.239.26) 26.015 ms 26.091 ms 26.084 ms 4 ae1-5.rt.irx.fkt.de.retn.net (87.245.232.244) 61.037 ms 53.253 ms 52.533 ms 5 * * * 6 * ae2.13.ear2.Boston1.net.lumen.tech (4.69.230.138) 135.086 ms 135.092 ms 7 * * * 8 * * * 9 * * * 10 * * * 11 * * * 12 * * * 13 * * * 14 * * * 15 * * * What are your opinions about this? -- Gruß Marco Send unsolicited bulk mail to 1755409526muell@stinkedores.dorfdsl.de

On Sun, Aug 17, 2025 at 08:13:45AM +0200, Marco Moock via tor-relays wrote:
Hello!
I cannot communicate with moria1 from 78.153.140.44 and it cannot reach my system. I can communicate with the rest of the world.
For me, it looks like a firewall is blocking it, as traceroute clearly indicates a different behaviour for ICMP echo request and TCP.
I think we have two problems here: (A) You seem to have a firewall on your side which is blocking TCP connections to moria1's IP address. You could compare traceroutes to 128.31.0.24 (same box, different address) to see if some of them get farther. Some of these blocks around the internet of 128.31.0.39 come from the ddos events of 2021, where some jerk tried to overload the directory authorities by requesting directory info via Tor circuits (i.e. via exit relays). See this ticket which was a theoretical issue for many years until suddenly it was a concrete issue: https://bugs.torproject.org/tpo/core/tor/2667 The attack resulted in a bunch of admins around the internet deciding that blackholing the directory authorities was the right answer, e.g. here is a case where Verizon fios blackholed me for five years until I finally used enough back-channels to get them to stop: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/98 (B) But it's worse than that! All of MIT seems to null-route your address too. That is, here is the traceroute from one of the MIT shared dialups (not my computer there in particular): ~> traceroute 78.153.140.44 traceroute to 78.153.140.44 (78.153.140.44), 30 hops max, 60 byte packets 1 18.9.64.3 (18.9.64.3) 0.643 ms 0.717 ms 0.772 ms 2 BACKBONE-RTR-2-OC11-RTR-1.MIT.EDU (18.0.194.85) 1.718 ms 1.777 ms 1.729 ms 3 DMZ-RTR-2-BACKBONE-RTR-2.MIT.EDU (18.0.162.1) 0.819 ms 0.885 ms 0.842 ms 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * [...continues on for 20 more failed hops] I believe this is because MIT auto pulls in the spamhaus blocklists and nullroutes based on them. Your whole /24 is on the SBL: https://check.spamhaus.org/results?query=78.153.140.44 (click on 'more info' at the bottom) More info on the MIT behavior here: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/90 and initial analysis about similar UCSD behavior here: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/97 (You could see whether you can reach SunGod from your relay too.)
What are your opinions about this?
It is sad that this happens and sad that it seems like it's happening more often lately. (Or maybe it has been happening like this for a while and we have only become better at noticing it lately?) Connectivity between relays is getting increasingly messy as more pieces of the internet decide to censor other pieces of the internet. We could imagine just abandoning all the parts of the internet that do these filters, and the Tor network would shrink to a smaller and smaller subset of the internet -- which is bad for scalability and bad for security. It is especially important to consider filters to/from the directory authorities, since if a majority of them can't reach your relay then users won't learn about you. So far, moria1 is the one where we've identified and understood the filters best, but the issue pops up on other dir auths too, e.g. https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/92 It is definitely a topic we are continuing to track and have been discussing among the dir auth operators. So long as it only affects a small minority of the directory authorities at any given time, the Tor network can tolerate it. And hey, having a small minority impacted can even (in a sense) be helpful since it helps us track how bad the problem is getting around the world. The part that makes me more worried is the increasing trend of filtering traffic to/from Tor exit relays. For example, at KAIST (the Korean technical institute) they block like 20% of the Tor network, not because they have explicitly chosen to block Tor but because they filter using third-party firewall lists which add a Tor exit as soon as it makes a connection to some secret honeypot address. The result is that Tor kind-of-mostly works as a client on that network (you can reach a guard after a few tries), but if they run a relay it can't make circuits to a lot of the rest of the network, leading to performance problems and maybe also anonymity problems for users. Hope this helps, --Roger

On 18.08.2025 03:08 Roger Dingledine via tor-relays <tor-relays@lists.torproject.org> wrote:
On Sun, Aug 17, 2025 at 08:13:45AM +0200, Marco Moock via tor-relays wrote:
Hello!
I cannot communicate with moria1 from 78.153.140.44 and it cannot reach my system. I can communicate with the rest of the world.
For me, it looks like a firewall is blocking it, as traceroute clearly indicates a different behaviour for ICMP echo request and TCP.
I think we have two problems here:
(A) You seem to have a firewall on your side which is blocking TCP connections to moria1's IP address. You could compare traceroutes to 128.31.0.24 (same box, different address) to see if some of them get farther.
No, I can reach other systems properly, the relay runs fine for months. As you can see from my traceroute, the issue is not local at my hoster.
Some of these blocks around the internet of 128.31.0.39 come from the ddos events of 2021, where some jerk tried to overload the directory authorities by requesting directory info via Tor circuits (i.e. via exit relays). See this ticket which was a theoretical issue for many years until suddenly it was a concrete issue: https://bugs.torproject.org/tpo/core/tor/2667
Can this be liftet again?
(B) But it's worse than that! All of MIT seems to null-route your address too. That is, here is the traceroute from one of the MIT shared dialups (not my computer there in particular):
Why don't they emit ICMP no route/route rejected in this case at least for their internally originating traffic? It sees they either null-route or block my address/net as a destination. Can someone from them investigate that?
~> traceroute 78.153.140.44 traceroute to 78.153.140.44 (78.153.140.44), 30 hops max, 60 byte packets 1 18.9.64.3 (18.9.64.3) 0.643 ms 0.717 ms 0.772 ms 2 BACKBONE-RTR-2-OC11-RTR-1.MIT.EDU (18.0.194.85) 1.718 ms 1.777 ms 1.729 ms 3 DMZ-RTR-2-BACKBONE-RTR-2.MIT.EDU (18.0.162.1) 0.819 ms 0.885 ms 0.842 ms 4 * * * 5 * * * 6 * * * 7 * * * 8 * * * 9 * * * 10 * * * [...continues on for 20 more failed hops]
I believe this is because MIT auto pulls in the spamhaus blocklists and nullroutes based on them. Your whole /24 is on the SBL: https://check.spamhaus.org/results?query=78.153.140.44 (click on 'more info' at the bottom)
I know, many hosters that allow TOR can land there.
More info on the MIT behavior here: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/90
Why are directory authorities operated in such networks? TOR exits are known to become listed on certain IP blacklists/DROP etc.
and initial analysis about similar UCSD behavior here: https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/97 (You could see whether you can reach SunGod from your relay too.)
I can reach it from both my relays using telnet. For the traceroute situation, FreeBSD traceroute (different than traceroute6) I had to pass -e additional to -p 443 and -P tcp. Now the packet looks like this: 06:24:46.144934 IP teufel.dorfdsl.de.54759 > sungod.sysnet.ucsd.edu.https: Flags [S], seq 29087207, win 0, length 0 Last hop is 13 agg-b-mcore.ucsd.edu (132.239.254.44) 197.409 ms 200.302 ms 200.034 ms I assume traceroute doesn't really implement TCP here, so the packet will be dropped. Linux traceroute is different and works. -- kind regards Marco Send spam to abfall1755479317@stinkedores.dorfdsl.de
participants (2)
-
Marco Moock
-
Roger Dingledine