[tor-relays] Possible DDoS

Christian Burkert post at cburkert.de
Fri Dec 26 14:48:20 UTC 2014


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Firstly, thanks for your advise.

Since I'm personally fed up with this provider, I'll move my Tor node
anyway. This last DDoS handling was just the last straw.

But before I discourage others from choosing this hosting provider, I
wanted to check the facts behind this DDoS attack, but within by own
log files, I can see nothing helpful.
I'm going to ask the provider for further information.

Putting a Tor hint into the reverse DNS entry sounds like a great
idea. I wouldn't have thought that this actually stops people from
attacking your server. Thanks!

Furthermore, I wondered if the attackers were attracted to my system
because of the Tor service, or were just randomly picking targets.
But from your previous descriptions, I rather deduce that it is more
like the latter, rather random attacks, right?

Anyway, I'll keep you informed about my investigations of the attack
if you like.

Regards,
Chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iQIcBAEBCgAGBQJUnXU0AAoJEHAzZ6ooPDSyGDYQAJ/6Fp7EGlLdZ5yCCgeyNUwS
Ku1rKmw5MYzeN3L7HMzLXYSFvKTzk0jtcz5oLwbpWYyHO3SumSI+N3prmsZPaoBy
Txo/zn4WllO1uFaAVsoxQOfpbM+J4x0qogX77RZYLyvrGPcewt6hm+EuyxkatjBd
rLSzlv2VbMntjUtkv5nM3zw/RIPyjNv5zsp9aBgSZLKRP+cyhONkuLqgmfaQ2tHG
ICzu8Rjwr5rpwNxXpfmJWwRasJg+HCu2u9awauOggQ8BIZ+8qkH1CuprXNgfulWt
xR82G+fmrywY1ODhB/go3j2Nx25gagMZLWbpnTSHYGcY9pL9TC7drkm0fw5ZB2VJ
92dlyPSj3bvdhSRVJBJiCQkhmtmqq4iLeZS2qoJLDcHAt70oePRMq4wJtVu7mugI
8e3uYL9f3SBTs3MsmSK/drGTEqNnhCl0ekLLPg4weRoEDSBkwsAmSVNwAqEhvs+P
6ZHWOOMVhZwPPJtQxupgIbDonBOuHg5BSrw5Csnqv+gwS2QNwOykdQV5ZKPxtXdS
rkv2q8TFpC7kBhnkljhdokXUDn19GmfM3OvxSRZbJe8+G/NNxKf50NeAQPuosnsr
AQYNClByNnfqXFOqFs2IIdUVHAaLuT5d4oZuA8YkTpJjZ6YMimjz2nlJO/QGxG9m
VKGNZ/BnQ/OYug3ejpwB
=ZbAl
-----END PGP SIGNATURE-----


More information about the tor-relays mailing list