[tor-relays] DoS on my non-exit relay? Or just oversensitive DoS "protection"?

Petrusko petrusko at riseup.net
Wed Aug 10 09:02:41 UTC 2016


Oops, forgot to say on my middle relay, 5MB/s up/down, TCP sockets is
usually between 3000 and 4000......



Le 10/08/2016 à 10:57, Petrusko a écrit :
> Hey,
>
> Since last ddos subject here, I've added a graph on my Munin node.
> The graph will show the number of TCP connections used, and I think it
> can be useful to see if there are some spikes = may be DoS attacks...?
> So if you have Munin running on your relay, it can be activated by
> creating a symlink "/etc/munin/plugins/tcp" to
> "/usr/share/munin/plugins/tcp"
>
>
>
> Le 10/08/2016 à 09:39, Sebastian Niehaus a écrit :
>> I am not sure whether it really looks like a DoS attack or if is just
>> many "normal" tor packets hammering on the small server which are
>> misunderstood as a DoS.
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20160810/3f44fd41/attachment.sig>


More information about the tor-relays mailing list