If your server is not responding, no harm done (likely already done if
you have iptables set up to drop unknown (established flag not set)
incoming traffic.).
If it's somehow maxing out your connection speed, then time to talk to
your upstream provider / hosting company - very likely they already
According to packetflow traces, roughly 26,000 unique IPv4 from 85 countries
executing a SYN flood attack on TCP/9001. None of my bridges have 9001 open nor
respond to this port. The attacks continue to this day.
Danke.
Jonas
___
tor-relays mailing li
nder DDoS (Philipp Winter)
--
Message: 1
Date: Wed, 11 Nov 2020 15:21:14 -0800
From: Philipp Winter
To: tor-relays@lists.torproject.org
Subject: Re: [tor-relays] Bridges under DDoS
Message-ID: <2020232114.rn2liq5gdnf3h...@nymity.
Grüezi,
Over the past seven days, all of my bridges are under DDoS attack. Other
servers hosted with adjacent IP addresses are not under attack. Any one else
seeing such attacks lately?
Curious that all of my bridges are under attack, meaning someone altogether
knows they exist.
Thanks.
On Wed, Nov 11, 2020 at 09:05:24PM -, Jonas wrote:
> Over the past seven days, all of my bridges are under DDoS attack.
> Other servers hosted with adjacent IP addresses are not under attack.
* What kind of DDoS are you seeing? Is it a lot of network packets?
Or network connections?
* What
On 11/11/20 10:05 PM, Jonas wrote:
Any one else seeing such attacks lately?
No
--
Toralf
OpenPGP_0xC4EACDDE0076E94E.asc
Description: application/pgp-keys
OpenPGP_signature
Description: OpenPGP digital signature
___
tor-relays mailing list
tor-r