Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Scott Bennett
Alex Xu wrote: > Quoting Felix (2017-12-11 17:07:30), as excerpted > > Hi Alex > > > > Great points. > > > > > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c > > > | sort -n > > > > On FreeBSD one can do: > > > > yeah, the optimal rule would ban "bad IPs" after some

[tor-relays] Is your IPv6 relay not Running?

2017-12-11 Thread teor
Hi, Since October 2017, a majority of directory authorities check relay IPv6 ORPorts. If your relay is configured with an IPv6 ORPort: ORPort [IPv6]:Port and it is not reachable over IPv6, it will be excluded from the consensus. This can happen if the address is wrong, or the IPv6 routing is w

Re: [tor-relays] UbuntuCore stats update

2017-12-11 Thread nusenu
teor: >> Chad MILLER: >>> Torix, that's still true. Snaps restrict syscalls so tightly that switching >>> users is not possible. >> >> Is it possible to start tor with a non-root user directly (without using >> tor's user parameter to drop privileges)? > > Yes, but you must pre-configure tor's d

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread null
Hi Alex, > This attack appears to be malicious to me. It seems to work like this: > 1. Open many OR connections (hundreds to thousands) > 2. Leave open until tor runs out of sockets > Tor presently waits for the connections to time out, which takes 3-4.5 > minutes. It should instead more aggress

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Alex Xu
Quoting Felix (2017-12-11 17:07:30), as excerpted > Hi Alex > > Great points. > > > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | > > sort -n > > On FreeBSD one can do: > yeah, the optimal rule would ban "bad IPs" after some threshold of connections, like "if one

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Dr Gerard Bulger
I am getting these warnings, not very often, and the exit (restricted) is working well otherwise: "Dec 11 18:07:23.000 [warn] Tried to establish rendezvous on non-OR circuit with purpose Acting as rendevous (pending)" Some posts about this elsewhere hinted this warning could be caused by attack

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Felix
Hi Alex Great points. > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | > sort -n On FreeBSD one can do: In packetfilter: # play with the numbers but more than 64k per ip if possible set limit { frags 7, src-nodes 7, states 7, table-entries 10 } tab

Re: [tor-relays] DoS attacks are real (probably)

2017-12-11 Thread x9p
On Mon, December 11, 2017 1:40 pm, Alex Xu wrote: > tl;dr: run this: > > conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | > sort -n Thanks for the detailed analysis. > ignore numbers less than 10. the remaining output should consist of the > following: ... > are not N

[tor-relays] DoS attacks are real (probably)

2017-12-11 Thread Alex Xu
tl;dr: run this: conntrack -L -p tcp --dport 9001 | awk '{print $5}' | sort | uniq -c | sort -n ignore numbers less than 10. the remaining output should consist of the following: 1. your IP 2. LeaseWeb and Online.net IPs (use rDNS and whois) 3. mobile networks block IPs in set 2 from acces