Re: [tor-relays] DDOS mitigation with nftables

2024-10-22 Thread Ralph Seichter via tor-relays
* Top:

> The script failed on my server, complaining that the `iptables` command
> couldn't be found (and no rules had been applied).

You provided too little information to offer detailed advice. Best not
to interpret error messages if you can post actual logs instead.
Generally speaking, your problems might be related to your PATH variable
content during script execution. You also may find [1] generally useful.

[1] 
https://wiki.nftables.org/wiki-nftables/index.php/Moving_from_iptables_to_nftables

> So how can I apply proper DDOS protection firewall rules whilst using
> `nftables`? Is there some easy way to modify the script to make it
> work?

The question of difficulty depends on your personal knowledge and
skills. Based on your own assessment, meddling with Kernel routing
tables might be beyond your current level of experience. You can
sabotage your server's operation and lock yourself out, so I urge you to
get comfortable with the whole subject in a test environment with backup
console access, before taking on a remote production server.

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


Re: [tor-relays] Tor relays source IPs spoofed to mass-scan port 22?

2024-10-28 Thread Ralph Seichter via tor-relays
* Pierre Bourdon:

> A few hours ago I received a forwarded abuse report from Hetzner for
> one of my machines running a Tor relay (not exit). Some random ISP was
> claiming I was sending SSH connections to them [...]

Same here. Middle relay, automated abuse report forwarded by Hetzner,
for alleged scans of TCP port 22 across several related IPv4 class-C
networks. I wondered if that was a mistake on the reporting third
party's end, but given that I am not the only on, it seems there is more
to it.

-Ralph
___
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays


[tor-relays] Re: Update: Tor relays source IPs spoofed to mass-scan port 22

2024-11-07 Thread Ralph Seichter via tor-relays
* Roger Dingledine:

> We should expect some more days of fallout, while mistaken abuse
> complaints are still being processed by various hosters.

You called it. Mere minutes ago, Hetzner forwarded another complaint,
for a grand total of 9 (yes, nine, what a gruesome level of abuse)
spoofed connection attempts over the course of November 5 and 6.

The destination addresses were part of the known class C subnets already
reported here, and the source of the complaint were of course the
tireless dolts at watchdogcyberdefense.com. Unsurprisingly, I can't tell
if Hetzner is not done processing old complaints, or if the complaining
party is still generating fresh mail based on their accumulated backlog.

Apart from that: My thanks to everybody who helped clamping down on this.

-Ralph
___
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org