[tor-relays] Bridge Sees 100x Clients Starting 2019-08-31

Porcelain Mouse porcelain_mouse at vfemail.net
Thu Sep 19 03:46:53 UTC 2019


On Wed, 18 Sep 2019 12:11, Philipp Winter wrote:
> On Mon, Sep 16, 2019 at 12:25:03PM -0700, Porcelain Mouse wrote:
>> 1) Can we be pretty sure the bulk of this sudden increase in users is 
>> abuse traffic?  If not, is this a problem?
>
> Are most of your new clients from Iran?  We believe that some popular 
> third-party software started using our bridges, causing these spikes.

Funny story...my ISP forced an IP changed on me yesterday.  Now I'm not 
getting any traffic at all.  From a recent thread on this list, I 
understand that it could take a while to get back to normal.  But, in any 
case, I cannot check, now.  I'll keep that in mind, though, if I get 
blasted again.

> >> 2)What should I do about it, if anything?
> There's not much to do at this point.  If this is becoming a burden for 
> your bridge, you could change its port(s), which may get rid of these 
> third-party users -- at least temporarily.

Okay, thanks for that suggestion.  I will keep that in my bag of tricks 
for the future.  I didn't know that could slow down attacks.

>> 3) Would using obfuscation help this problem?
>
> I'm not sure what protocols this third-party software uses.  Since 
> you're asking, I assume your bridge only runs vanilla Tor?

I run RPM-base distro and would prefer to stick with packages I can get 
easily.  But, I could build tor for myself, if it came to that.  I was 
specifically thinking of obsf4 when I asked this question, but I only 
looked into it, briefly, and don't know exactly how it works.  I seems 
like it answers connections for tor, ala inetd and tcp wrappers, and you 
can just add it to your torrc. Is that not right?  Anyway, I guess it 
doesn't matter, the issue has passed.  I just saw your call for obsf4 and 
couldn't figure out what it does that is useful to the project.  I want my 
node to be useful.

P.S. Sorry about misspelling your name.

-- 
PMouse


More information about the tor-relays mailing list