[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-relays] Tor node break-in attempts
Hi LB,
SSH attacks happen 24/7 and are just stupid brute force mostly without
any reason.
You already setted up key auth and hopefully disabled password auth.
You can block brute force by setting up a log watcher like fail2ban.
That application follows the auth.log file on your server and adds an
iptables rules to drop the traffic from the attacker.
~Josef
Am 22.10.2015 um 21:13 schrieb Larry Brandt:
> Hello,
> I need some advise on a situation new to me. I operate a VPS exit
> node in Romania, a VPS guard node in the Czech Republic, a middle node
> and bridge in the US. All are SSH public key authentication protocol
> 2. Over the last 5 weeks all of these servers have been under attack
> by IPs in the range 43.229.52.00 to 43.229.55.255. Maybe 24 different
> IP addresses. I have contacted the operator in Hong Kong on four
> different occasions but I've received no relief from the attempted
> attacks nor have they communicated back to me--as I have requested.
> Attack counts are in the 100,000s.
> I have no personal information stored on any of these servers--only
> public info via Tor is available. And then, how the hell did they get
> the address of my bridge?
> I see break-in attempts all the time but never at this volume. The
> break-in attempts have been thwarted to date and will probably remain
> so. But I find the situation disconcerting and irritating.
> Should I ignore these efforts? Should I send abuse reports to
> someone? Who? Any sage advice out there?
> Did I give away any secure info just now? lol
> LB
>
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays