[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Bridges under DDoS
If your server is not responding, no harm done (likely already done if
you have iptables set up to drop unknown (established flag not set)
incoming traffic.).
If it's somehow maxing out your connection speed, then time to talk to
your upstream provider / hosting company - very likely they already
have anti dos equipment on their network, and many would just re-route
a customer through it until the attack stops, but it might cost you
some money.
2020-11-13 17:03 GMT, Jonas <jonasdietrich@xxxxxxxxxxxx>:
> According to packetflow traces, roughly 26,000 unique IPv4 from 85 countries
> executing a SYN flood attack on TCP/9001. None of my bridges have 9001 open
> nor respond to this port. The attacks continue to this day.
>
> Danke.
>
> Jonas
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays