Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread grarpamp
There are often silly filters and SSH WARNING OMG type of things people do individually that are generally moot. That was probably the context. No time to cover various scenarios therein. Here, we're considering aggregating the entire network as one to see about what may be going on as a whole. Be

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Igor Mitrofanov
Sorry for the spam. One more link to a tuning guide that I have found useful: https://access.redhat.com/sites/default/files/attachments/20150325_network_performance_tuning.pdf On Sat, Nov 25, 2017 at 10:04 PM, Igor Mitrofanov wrote: > After reading every paper and post on sysctl.conf and iptable

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Igor Mitrofanov
After reading every paper and post on sysctl.conf and iptables tuning I could find, and reading some kernel code, I have come to a conclusion that, while there are a few settings to tune (can share mine, but your mileage *will* vary), most of the defaults are actually not broken in the latest kerne

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Igor Mitrofanov
Do not enable net.ipv4.tcp_tw_recycle: https://vincent.bernat.im/en/blog/2014-tcp-time-wait-state-linux#netipv4tcp_tw_recycle For ip_local_port_range, make one number even and the other one odd (i.e. 1024 and 65535). Not sure if this is still required, but won't hurt to include port 1024. Conside

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Scott Bennett
grarpamp wrote: > On Fri, Nov 24, 2017 at 6:23 PM, wrote: > > Was anyone else's exit being synflooded yesterday and today? > > There could be a combined monitoring array deployed > among all nodes that might start to answer these questions. > And further alert on all sorts of interesting networ

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread Dhalgren Tor
>Well, it's still going on, and is pretty much ruining Libero :( . Running >CentOS 6, here. > >When it's happening it can look like this: > ># netstat -n | grep -c SYN >17696 I run a fast exit and can offer some advice: 1) mitigate bug #18580 (also #21394); is a DNS denial-of-service and could

Re: [tor-relays] Tor Metrics issue

2017-11-25 Thread Iain R. Learmonth
Hi, > Arisbe:>> I looked up my relays and bridges on Atlas using their nickname, > IP>> address or fingerprint.  I bookmarked these look-ups so that I could>> easily access the Atlas data for my nodes going forward. No URLs have changed (planning to change them in the near future but nothing chan

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread teor
> On 26 Nov 2017, at 07:14, grarpamp wrote: > > The subject of this new thread is detecting network > attack upon tor network / relays itself. Nick Mathewson has mentioned wanting to do this for Tor protocol violations. But we need a privacy-preserving aggregation scheme in Tor so we can do the

Re: [tor-relays] Tor Metrics issue

2017-11-25 Thread nusenu
Arisbe: > I looked up my relays and bridges on Atlas using their nickname, IP > address or fingerprint.  I bookmarked these look-ups so that I could > easily access the Atlas data for my nodes going forward. > > I took the same tack with Tor|Metrics:  I navigated > Home>>Services>>Relay Search>>

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread grarpamp
The subject of this new thread is detecting network attack upon tor network / relays itself. You report is users using tor's exits / exit traffic from relays, which would be excluded from such monitoring, most absolutely in any identifiable manner. If the exit traffic bothers you, exitpolicy reje

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread tor
I went and added a reject for exit to port and HUPed the process. Maybe this is the fix! :) ___ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Re: [tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread tor
Well, it's still going on, and is pretty much ruining Libero :( . Running CentOS 6, here. Actually, I think from what I'm seeing that it may not exactly be a synflood targeting Libero. I think Libero may be being (ab)used to do massive portscanning or similar. Image should be visible below -

[tor-relays] Detecting Network Attack [re: exit synflooded]

2017-11-25 Thread grarpamp
On Fri, Nov 24, 2017 at 6:23 PM, wrote: > Was anyone else's exit being synflooded yesterday and today? There could be a combined monitoring array deployed among all nodes that might start to answer these questions. And further alert on all sorts of interesting network attacks launched at Tor. So

Re: [tor-relays] Exit from Different IP from OR Port

2017-11-25 Thread grarpamp
>> The trouble now >> is too many are sites apply blanket bans on Tor exits. > Starting with tor 0.3.0.x if your exit relay has multiple public IP > addresses you can use one of them for exiting only without the need of > an additional VPN (which degrades performance) Depending on setup, shufflin

Re: [tor-relays] Pretty sure our exit was being synflooded.

2017-11-25 Thread x9p
syncookies and -m connlimit limiting /24 always worked for me. some players with access to /24 can be pretty annoying sometimes. x9p > Was anyone else's exit being synflooded yesterday and today? I put > some iptables code in to help, it might have mitigated it. > > I'm pretty sure our exit "Lib

Re: [tor-relays] Exit from Different IP from OR Port

2017-11-25 Thread nusenu
Dr Gerard Bulger: > Direct Exit to a different IP. > > I naively thought that the proxy lines in torrc could to that via an > https proxy. Alas that's not what that line is for! > > I got an impression from earlier chats a while ago that exiting to a > non-advertised IP was regarded as simply

[tor-relays] Exit from Different IP from OR Port

2017-11-25 Thread Dr Gerard Bulger
Direct Exit to a different IP. I naively thought that the proxy lines in torrc could to that via an https proxy. Alas that's not what that line is for! I got an impression from earlier chats a while ago that exiting to a non-advertised IP was regarded as simply not cricket, in that the interne

Re: [tor-relays] my IP got blocked -> closed

2017-11-25 Thread Patrice
Hi, I want to tell that the issue is no longer exists. I can now visit ebay, ikea, ect. without a problem. It was like grarpamp said, there was a bunch of malicious software on one of my Computers. Very shameful, there was no virus detection installed. Therefore my tor relay was not the pro

Re: [tor-relays] Pretty sure our exit was being synflooded.

2017-11-25 Thread Artem
Same happened to me. ISP sent me 2 messages in 10 minutes about outgoing 8Kpps/4Mbps flood and then quickly frozen my VPS. 2017-11-25 2:02 GMT+02:00 Paul Templeton : > Happening to middles as well - I get black hold all the time - ISP has > auto rules. > > Paul > > - Original Message - >

Re: [tor-relays] Tor Metrics issue

2017-11-25 Thread Arisbe
I looked up my relays and bridges on Atlas using their nickname, IP address or fingerprint.  I bookmarked these look-ups so that I could easily access the Atlas data for my nodes going forward. I took the same tack with Tor|Metrics:  I navigated Home>>Services>>Relay Search>>(node ID) This r

Re: [tor-relays] Tor Metrics issue

2017-11-25 Thread Arisbe
On 25 Nov 2017, at 17:36, Arisbe wrote: In the immediate past I monitored both my relays and my bridges through atlas. So, now with Tor Metrics, I don't see my bridges. Am I doing something wrong or are they not in the data base? How do you search for your relays and bridges? T