[tor-relays] DoS stats from exits running 0.3.3.2-alpha

Matt Traudt pastly at torproject.org
Fri Feb 16 20:21:47 UTC 2018


On 2/16/18 12:23, nusenu wrote:
> I was wondering if these unfriendly tor clients are using tor's default
> path selection or something else.
> 
> If they do tor exit relays would have much smaller values in their DoS stats, right?
> 
> Would any tor exit operator (listed bellow) running 0.3.3.2-alpha be willing to share (obfuscated/not exact
> counters) of their DoS log entries? (only if you do not have any additional firewall rules filtering packets)
> 
> 

I run an 0332-alpha relay with no extra firewall rules.

4B084AD6A0BA70761A333829F52042BB6EA009AF

In case the following gets wrapped and ruined: https://paste.debian.net/1010648/

Feb 16 01:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 5x v1 connections, 1xx v2 connections, 9xx v3 connections, and 4xxxxx v4 connections.
Feb 16 01:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 2xx single hop clients refused.
Feb 16 07:50:55.000 [notice] Heartbeat: Tor's uptime is 5 days 23:28 hours, with 4xxx circuits open. I've sent 1xxx GB and received 1xxx GB.
Feb 16 07:50:55.000 [notice] Circuit handshake stats since last time: 4xxx/4xxx TAP, 1xxxxx/1xxxxx NTor.
Feb 16 07:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 7x v1 connections, 1xx v2 connections, 9xx v3 connections, and 4xxxxx v4 connections.
Feb 16 07:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 3xx single hop clients refused.
Feb 16 13:50:55.000 [notice] Heartbeat: Tor's uptime is 6 days 5:28 hours, with 4xxx circuits open. I've sent 1xxx GB and received 1xxx GB.
Feb 16 13:50:55.000 [notice] Circuit handshake stats since last time: 4xxx/4xxx TAP, 1xxxxx/1xxxxx NTor.
Feb 16 13:50:55.000 [notice] Since startup, we have initiated x v1 connections, x v2 connections, x v3 connections, and 5xxxx v4 connections; and received 7x v1 connections, 1xx v2 connections, 1xxx v3 connections, and 4xxxxx v4 connections.
Feb 16 13:50:55.000 [notice] DoS mitigation since startup: x circuits rejected, x marked addresses. x connections closed. 3xx single hop clients refused.


More information about the tor-relays mailing list