[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Pretty sure our exit was being synflooded
Thanks for the configuration suggestions. I intentionally set the 
conntrack limit high, maybe that  was not the best thing. I think I'll 
be putting it back.
Removing my extra IPTables code plus adding a reject for :8888 has 
made the exit behave properly again.
I wonder if the best possible course of action for this sort of thing 
would be within Tor itself. I don't know that it was a single client 
connection into Tor that was causing all this trouble, but maybe it 
was. One would think that one client should not be allowed to do 
something so severe with the TCP that it can single-handedly ruin a 
fast exit. Maybe a code change that forces a rate-limit that 
significantly slows down the ability of a single client to roll port 
scans should be considered by the devs.
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays