[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Attack on Tor exit and back-up directory server



Hello All,
I commented and questioned earlier about significant slowing of one of my Finnish exit relays [1] and potential DoS attack.  I took the server off line and did the best job I could hardening it.  The host does not have DoS protection and uses Xen OpenVZ as his VPS manager.  I was getting "nf_contract: table full, dropping packet." errors by the 1000s.  That's fixed and I'm back on the Tor net now.
One question remains:  At any time I look there are 20-150 Iranian IP addresses trying to access the Tor server.  Their IP range is from 5.113.x.x to 5.126.x.x.  None have hashed fingerprints.  Is it okay to let these guys go?  Can they harm or slow Tor?  Should I ban them?  I'd like to learn from this.
-potlatch


Sent with ProtonMail Secure Email.

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays