[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Tor flood symptom?



My relay that has been running release 0.2.4.17-rc for several day now
has become saturated with what I would consider 'noise' - namely a huge
amount of handshake activity.  It does respond downward to lowereing the
bandwidth setting, but the bandwidth graph is nearly flat.  Now I have
just noticed two crypto errors in the message log. 

Sep 23 14:17:32.902 [Notice] Circuit handshake stats since last time:
224326/224887 TAP, 40/40 NTor.
Sep 23 15:17:32.999 [Notice] Circuit handshake stats since last time:
224169/225104 TAP, 77/77 NTor.
Sep 23 16:17:32.016 [Notice] Circuit handshake stats since last time:
224655/225333 TAP, 63/63 NTor.
Sep 23 16:50:14.883 [Warning] crypto error while checking RSA signature:
block type is not 01 (in rsa routines:RSA_padding_check_PKCS1_type_1)
Sep 23 16:50:14.883 [Warning] crypto error while checking RSA signature:
padding check failed (in rsa routines:RSA_EAY_PUBLIC_DECRYPT)
Sep 23 17:17:32.782 [Notice] Circuit handshake stats since last time:
222538/222987 TAP, 14/14 NTor.
Sep 23 17:36:03.704 [Warning] eventdns: All nameservers have failed
Sep 23 17:36:03.829 [Notice] eventdns: Nameserver 192.168.1.254:53 is
back up

Is this acceptable or should I report this to bugzilla?

David?
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays