[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] Botnet issues and upgrading to 0.2.4.x



I run a few Rasp PI relays. If you use Tor 2.3.5 you need to limit bandwidth to 100KB or less and make sure the CPU is not overclocked to avoid heating issues unless you stick it in the fridge or something.

2.4.17 is much better at dealing with circuit storms, i can push 3Mbps upstream with no issues.Â

try setting up cron if it keeps crashing. eg.

*/15 * * * * /etc/init.d/tor start
Â


On 14 October 2013 23:42, Dan Staples <danstaples@xxxxxxxxx> wrote:
I don't think it would make a difference. When my relay is experiencing
a circuit-creation storm, I've restarted Tor, and even stopped it for a
few minutes, but as soon as it comes back online, it gets slammed
again. Only leaving it offline for an hour or so and then turning it
back on seems to mitigate the problem.

On Mon 14 Oct 2013 06:11:10 PM EDT, Chris Whittleston wrote:
> Do you think it might help to restart tor every 24 hours or so using
> cron Dan - or would that adversely affect the network too much/not
> actually help?
>
> On 14 Oct 2013 22:32, "Dan Staples" <danstaples@xxxxxxxxx
> <mailto:danstaples@xxxxxxxxx>> wrote:
>
> Â Â In my experience, setting the bandwidth advertising options does
> Â Â nothing to stop the "storms" of circuit creation requests. It *will*
> Â Â affect the *average* bandwidth used by your relay, but every once in a
> Â Â while, I'll still get circuit-creation storms that completely
> Â Â overwhelm
> Â Â my RPi and knock it offline (I'm talking continuous 3Mbps
> Â Â bandwidth use
> Â Â for several hours when MaxAdvertisedBandwidth is 200 kbps). It seems
> Â Â from past discussions on the mailing list, this is still an unresolved
> Â Â issue.
>
> Â Â On Mon 14 Oct 2013 04:43:50 PM EDT, Chris Whittleston wrote:
> Â Â > Thanks Logforme - yeah I was trying that before I sent the first
> Â Â email
> Â Â > in this chain, but maybe I didn't go low enough with the advertised
> Â Â > bandwidth. When the 0.2.4 compilation is done (it's still chugging
> Â Â > along) I'll try going lower and see if it helps.
> Â Â >
> Â Â > Chris
> Â Â >
> Â Â >
> Â Â > On 14 October 2013 21:38, Logforme <m7527@xxxxxx
> Â Â <mailto:m7527@xxxxxx>
> Â Â > <mailto:m7527@xxxxxx <mailto:m7527@xxxxxx>>> wrote:
> Â Â >
> Â Â > Â Â On 2013-10-14 22:01, Chris Whittleston wrote:
> Â Â > Â Â > I see - so I'll probably still see the problem with a huge
> Â Â number of
> Â Â > Â Â > circuits being created after I've finished building 0.2.4.
> Â Â Is there
> Â Â > Â Â > any way to limit this, I'm guessing reducing the bandwidth
> Â Â wouldn't
> Â Â > Â Â > actually help? I guess I'll look into how much further I can
> Â Â > Â Â overclock
> Â Â > Â Â > the CPU...
> Â Â > Â Â Only option that I know of is to reduce the bandwidth you
> Â Â advertise to
> Â Â > Â Â the network. The more bandwidth you advertise the more circuits
> Â Â > Â Â the tor
> Â Â > Â Â network will throw at your relay. The following flags in the
> Â Â torrc
> Â Â > Â Â file
> Â Â > Â Â can be used (with my current understanding of them):
> Â Â > Â Â BandwidthRate : The max bandwidth you provide over a long period
> Â Â > Â Â of time
> Â Â > Â Â BandwidthBurst : The max bandwidth you provide over a short
> Â Â period
> Â Â > Â Â of time
> Â Â > Â Â MaxAdvertisedBandwidth : The max bandwidth you tell the tor
> Â Â > Â Â network about
> Â Â > Â Â So you can set BandwidthRate to the real max you want to
> Â Â provide and
> Â Â > Â Â then set MaxAdvertisedBandwidth to a number low enough to
> Â Â prevent
> Â Â > Â Â circuit overload.
> Â Â >
> Â Â > Â Â _______________________________________________
> Â Â > Â Â tor-relays mailing list
> Â Â > Â Â tor-relays@xxxxxxxxxxxxxxxxxxxx
> Â Â <mailto:tor-relays@xxxxxxxxxxxxxxxxxxxx>
> Â Â > Â Â <mailto:tor-relays@xxxxxxxxxxxxxxxxxxxx
> Â Â <mailto:tor-relays@xxxxxxxxxxxxxxxxxxxx>>
> Â Â > Â Â https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> Â Â >
> Â Â >
> Â Â >
> Â Â >
> Â Â > --
> Â Â > *Dr Chris Whittleston æä*
> Â Â > Department of Chemistry
> Â Â > University of Cambridge
> Â Â > Lensfield Road, Cambridge, CB2 1EW
> Â Â > Email: csw34@xxxxxxxxx <mailto:csw34@xxxxxxxxx>
> Â Â <mailto:csw34@xxxxxxxxx <mailto:csw34@xxxxxxxxx>>
> Â Â > Tel: +44 (0)1223 336423 <tel:%2B44%20%280%291223%20336423>
> Â Â >
> Â Â >
> Â Â > _______________________________________________
> Â Â > tor-relays mailing list
> Â Â > tor-relays@xxxxxxxxxxxxxxxxxxxx
> Â Â <mailto:tor-relays@xxxxxxxxxxxxxxxxxxxx>
> Â Â > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
> Â Â --
> Â Â http://disman.tl
> Â Â OpenPGP key: http://disman.tl/pgp.asc
> Â Â Fingerprint: 2480 095D 4B16 436F 35AB 7305 F670 74ED BD86 43A9
> Â Â _______________________________________________
> Â Â tor-relays mailing list
> Â Â tor-relays@xxxxxxxxxxxxxxxxxxxx
> Â Â <mailto:tor-relays@xxxxxxxxxxxxxxxxxxxx>
> Â Â https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

--
http://disman.tl
OpenPGP key: http://disman.tl/pgp.asc
Fingerprint: 2480 095D 4B16 436F 35AB 7305 F670 74ED BD86 43A9
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays