[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] huge increase in relay traffic



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Richard Budd:
> I'm seeing the same on all 5 of my non-exit nodes, they are spread
> around the US and EU. It seems that they all are running at close
> to max bandwith for the last several days also.

My guess is whoever is running the DDOS[1] figured out that they can
most cheaply disrupt the Tor network by creating bogus circuits (and
eventually causing relays to run out of RAM and/or CPU) rather than
sending reams of bogus data through.

Whether that's true or not, my experiments with Raspberry Pi relays
provide sort of a 'canary in the coal mine' - enough circuits and tor
*will* consume all available RAM and be killed, as happened finally to
me sometime in the wee hours here.

[1] I presume it's a DDOS because a) come on; b) look at the graph of
    clients connecting from Vietnam.  ~0 to ~5000 in a week or two?
    Yeah right.

Best,
- -Gordon M.


-----BEGIN PGP SIGNATURE-----

iQEcBAEBCgAGBQJSIjPeAAoJED/jpRoe7/ujuUsIAKRCXz51z+/5MRywfYA48ySi
4325YqSdjzl8mhDKmpOOohhUTMTkCPJvDsD4BC8JyoaEk4cDDdsKMOwPUx2szvAr
Vhkh7rwMqYuDR/nkH+E2w9CVPFgo8BeVbuRSuewX/vvVE4nAS1m4ULB3ffA3EYko
dC9kFN9vf1uFb8lMGu6rVAULm6f8kzWYMGZ0uaWat6qQ4x45kWLxt8Y3caHESk3U
2tpLLAOLT7nhqGC1ALNOEm3gmox1xRFQM1vaYUdpIGb4hhkRKtHEXj+J00Mp0sPH
f4QQhPv+nUbEKamJD45MItU34Iv6zjTJVx9TP5ZkZ1qpa835YsknXaSXpjUe0Yg=
=UjmG
-----END PGP SIGNATURE-----
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays