| server1:~$ ss -s Total: 454644 TCP:   465840 (estab 368011, closed 36634, orphaned 7619, timewait 11466) Transport Total     IP        IPv6 RAW	  0         0         0         UDP	  48        48        0         TCP	  429206    413815    15391     INET	  429254    413863    15391     FRAG	  0         0         0       81% inet_csk_bind_conflict server2:~$ ss -s Total: 460089 TCP:   477026 (estab 367786, closed 42817, orphaned 7456, timewait 17239) Transport Total     IP        IPv6 RAW	  0         0         0         UDP	  71        71        0         TCP	  434209    418235    15974     INET	  434280    418306    15974     FRAG	  1         1         0   80% inet_csk_bind_conflict (total combined throughput at the time of measurement was ~650 Mbps symmetrical per transit provider metrics, this low throughput volume is common when inet_csk_bind_conflict is this high) Re OutboundBindAddress - yes, for both v4 and v6 Re kernel version - 5.15.0-56-generic (jammy). Foundation for Applied Privacy recommended that we try the nightly repo which apparently includes the IP_BIND_ADDRESS_NO_PORT change. However that merge request mentions a workaround of modifying net.ipv4.ip_local_port_range, which we've already performed. -- Christopher Sheats (yawnbox) Executive Director Emerald Onion Signal: +1 206.739.3390 Website: https://emeraldonion.org/ Mastodon: https://digitalcourage.social/@EmeraldOnion/ 
 | 
Attachment:
signature.asc
Description: Message signed with OpenPGP
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays