[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Bridge Sees 100x Clients Starting 2019-08-31



On Wed, 18 Sep 2019 12:11, Philipp Winter wrote:
On Mon, Sep 16, 2019 at 12:25:03PM -0700, Porcelain Mouse wrote:
1) Can we be pretty sure the bulk of this sudden increase in users is abuse traffic? If not, is this a problem?

Are most of your new clients from Iran? We believe that some popular third-party software started using our bridges, causing these spikes.

Funny story...my ISP forced an IP changed on me yesterday. Now I'm not getting any traffic at all. From a recent thread on this list, I understand that it could take a while to get back to normal. But, in any case, I cannot check, now. I'll keep that in mind, though, if I get blasted again.

>> 2)What should I do about it, if anything?
There's not much to do at this point. If this is becoming a burden for your bridge, you could change its port(s), which may get rid of these third-party users -- at least temporarily.

Okay, thanks for that suggestion. I will keep that in my bag of tricks for the future. I didn't know that could slow down attacks.

3) Would using obfuscation help this problem?

I'm not sure what protocols this third-party software uses. Since you're asking, I assume your bridge only runs vanilla Tor?

I run RPM-base distro and would prefer to stick with packages I can get easily. But, I could build tor for myself, if it came to that. I was specifically thinking of obsf4 when I asked this question, but I only looked into it, briefly, and don't know exactly how it works. I seems like it answers connections for tor, ala inetd and tcp wrappers, and you can just add it to your torrc. Is that not right? Anyway, I guess it doesn't matter, the issue has passed. I just saw your call for obsf4 and couldn't figure out what it does that is useful to the project. I want my node to be useful.

P.S. Sorry about misspelling your name.

--
PMouse
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays