[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] DoS on my non-exit relay? Or just oversensitive DoS "protection"?



Hey,

Since last ddos subject here, I've added a graph on my Munin node.
The graph will show the number of TCP connections used, and I think it
can be useful to see if there are some spikes = may be DoS attacks...?
So if you have Munin running on your relay, it can be activated by
creating a symlink "/etc/munin/plugins/tcp" to
"/usr/share/munin/plugins/tcp"



Le 10/08/2016 à 09:39, Sebastian Niehaus a écrit :
> I am not sure whether it really looks like a DoS attack or if is just
> many "normal" tor packets hammering on the small server which are
> misunderstood as a DoS.

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays