[tor-relays] DoS on my non-exit relay? Or just oversensitive DoS "protection"?

Petrusko petrusko at riseup.net
Wed Aug 10 08:57:35 UTC 2016


Hey,

Since last ddos subject here, I've added a graph on my Munin node.
The graph will show the number of TCP connections used, and I think it
can be useful to see if there are some spikes = may be DoS attacks...?
So if you have Munin running on your relay, it can be activated by
creating a symlink "/etc/munin/plugins/tcp" to
"/usr/share/munin/plugins/tcp"



Le 10/08/2016 à 09:39, Sebastian Niehaus a écrit :
> I am not sure whether it really looks like a DoS attack or if is just
> many "normal" tor packets hammering on the small server which are
> misunderstood as a DoS.

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160810/e4661a68/attachment.sig>


More information about the tor-relays mailing list