[tor-dev] connectivity failure for top 100 relays

nusenu nusenu-lists at riseup.net
Wed May 2 20:41:00 UTC 2018


> I think that many of my previous scans were not useful and
> showed inaccurate 

I'm glad that it turned out that these previous results might have been inaccurate
(because the results were scary if found to be accurate)

> results because the IP address i was scanning
> from might have gotten black listed by dir-auths?

I don't see how dir auths could blacklist specific client IP addresses
(tor clients use fallbackdirs)

> or perhaps blocked
> by many relays by the anti-denial-of-service mechanisms in tor?

can you let me know the start and end date of the scan (2018-03-12?) so I can check how many of
the relays you scanned (the top 100 relays by cw? at the time) 
had a tor version with anti ddos features at the time?

During your first scans (2017) there have  been no anti-dos features.

> i got rid of that virtual server and lost use of it's IP address... so we'll never know.
> 
> Katharina and I are interested in doing lots more thorough scans of
> the Tor network rather than this limited methodology i've been using.

I'm excited to hear that.

> What are the guidelines to avoid getting blocked by the tor network?

stay under the public thresholds?
https://www.torproject.org/docs/tor-manual-dev.html.en#_denial_of_service_mitigation_options

> Is it possible to check the consensus to see if a client IP has been blocked?

the consensus holds information about relays not about tor client IP addresses, but
I assume you know that and I misunderstood your question?


-- 
https://mastodon.social/@nusenu
twitter: @nusenu_

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-dev/attachments/20180502/ea3493c7/attachment.sig>


More information about the tor-dev mailing list