[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22



It’s possible that the attack was filtered upstream, and since you’re closer to the attacker, you might still be seeing those spoofed packets. Also, if you’re noticing spoofed packets coming from your own network, it could indicate a deeper issue. Have you checked if reverse path filtering is enabled?

On 9/11/24 23:15, tor-operator@xxxxxxxxxxx wrote:
I can confirm that the attack has not stopped and that we continue to
monitor spoofed packets with Tor relay's IP addresses including the
addresses of relays that are at our network.

This continues to trigger the sending of reports from the same amateurs.
_______________________________________________
tor-relays mailing list -- tor-relays@xxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to tor-relays-leave@xxxxxxxxxxxxxxxxxxxx

_______________________________________________
tor-relays mailing list -- tor-relays@xxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to tor-relays-leave@xxxxxxxxxxxxxxxxxxxx