[tor-relays] Relay usage dropped 9x when enabling UFW. What UFW rules > do other relay operators enact?

zorc zorc+tor at protonmail.ch
Wed Jun 19 12:43:15 UTC 2024


Hi Likogan,

> What UFW rules do other relay operators enact?

I'm running 4CEAFCE5841C0DAE30164B4F59452F7F4D818A67 on Linux Mint 21.3 (should be close to Ubuntu Jammy) with UFW enabled, and don't have any issues. I have the same two rules for Tor as you do. I can imagine three things:

1. To me it looks like you have other rules before your Tor rules. Are any of them rate limiting?
2. I don't run an exit node, so I don't know how UFW would behave in that case.
3. Do you have logging rules? I once had issues with my router running out of CPU due to some logging rules being triggered by Tor-related traffic (potentially malicious). Maybe UFW could achieve something similar?

Hope that helps.

Cheers,
zorc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: publickey - zorc+tor at protonmail.ch - 0x64C416E0.asc
Type: application/pgp-keys
Size: 584 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240619/b3d70856/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 249 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240619/b3d70856/attachment.sig>


More information about the tor-relays mailing list