[tor-relays] outgooing UDP flooding on middle relay

teor teor2345 at gmail.com
Mon Aug 1 12:50:12 UTC 2016


> On 1 Aug 2016, at 22:47, Tristan <supersluether at gmail.com> wrote:
> 
> How can a Tor relay flood UDP? I thought everything was TCP?

Exits can flood an under-resourced DNS server quite easily.
That's why we recommend a local DNS resolver / cache.

But this particular relay is not an exit.

Perhaps it was a (D)DoS attack, and the provider is confused about where it was coming from?
Perhaps the server was used in a (D)DoS attack? (Does it serve DNS? Does that DNS have large records?)

Tim

Tim Wilson-Brown (teor)

teor2345 at gmail dot com
PGP C855 6CED 5D90 A0C5 29F6 4D43 450C BA7F 968F 094B
ricochet:ekmygaiu4rzgsk6n
xmmp: teor at torproject dot org





-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160801/63e59818/attachment.sig>


More information about the tor-relays mailing list