[tor-relays] Traffic in port 9050 in a relay (denial of service attack?)

jj tor jjproyects at gmail.com
Tue Nov 5 08:36:53 UTC 2013


Sorry for the confusión, the exact line in my torrc is "Socksport 0", so,
SOCKS port is closed. Moreover, I haven't got any exit rule towards port
9050

Even if I block this traffic using iptables, I am very curious about  why
the server is receiving that huge amount

Maybe, because my relay's exit policy? (exit policy-->
doc/ReducedExitPolicy – Tor Bug Tracker & Wiki :
https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy)


2013/11/5 Paritesh Boyeyoko <parity.boy at gmail.com>

>  @jj tor
>
>
>
> ...and before I forget, yes deploy IPtables anyway. :)
>
>
>
> Best,
>
> --
>
> Parity
>
> parity.boy at gmail.com
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20131105/0eda7eab/attachment.html>


More information about the tor-relays mailing list