[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Traffic in port 9050 in a relay (denial of service attack?)



What is the fingerprint of your exit node, maybe someone here can take a look?

Also, use iptables! If it is a dedicated VPS then drop anything you dont recognize, leaving only Tor ports (9001,9030 default) and maybe a service port like 22 for SSH for something. Port 9050 should not be visible from outside...

Tom


On 5 November 2013 08:36, jj tor <jjproyects@xxxxxxxxx> wrote:
Sorry for the confusión, the exact line in my torrc is "Socksport 0", so, SOCKS port is closed. Moreover, I haven't got any exit rule towards port 9050

Even if I block this traffic using iptables, I am very curious about  why the server is receiving that huge amount

Maybe, because my relay's exit policy? (exit policy--> doc/ReducedExitPolicy – Tor Bug Tracker & Wiki : https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy)


2013/11/5 Paritesh Boyeyoko <parity.boy@xxxxxxxxx>

@jj tor

 

...and before I forget, yes deploy IPtables anyway. :)

 

Best,

--

Parity

parity.boy@xxxxxxxxx


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays



_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays