Addendum: two days later, things are back to normal. Consensus still
about 300, but i guess thats normal to adjust slower. Up/download now at
the allowed 1,2M limit.
Since i don't believe that i have some kind of special setup/situation
here, i assume it takes some time to rebuild connections
Hi everyone,
can confirm. compare.sh shows "fluctuation" of relay IPs as announced.
The tor-ddos ipset is a bit smaller here (ca. 70 atm).
Observation, though: since activation, data throughput went from
600-800k down to about 100 or even lower. Hardware/Connection should be
able to handle a
An effect can definitely be seen.
I now have an average of 30 relays and over 600 IPs in the block list.
Am 07.10.22 um 09:18 schrieb Chris:
Compare.sh will tell you how many of the IPs in the block list are
relays. You've collected a lot more IPs in your block list. Open a
terminal and typ
Compare.sh will tell you how
many of the IPs in the block list are relays. You've collected
a lot more IPs in your block list. Open a terminal and type:
ipset -L tor-ddos and you'll
see how many IPs are sitting in your block list.
Hoi, Chris,
oh wow, that seems to help a lot. Uptime 1/2 hour now, load 50-60% and
six IPs collected according to compare.sh. No signs of overload yet.
Thanks a lot, and i'll report, how things evolved. ATM, it looks like
you can add the "n00b proof"-stamp to your concept :)
Greets and than
Hi Richie
I was a bit lost myself having
to deal with the scripts and additional packages to install.
So I put something together for myself based on the same rules
and added a few twists but in a simple text n00b proof format.
It's as simple a
On 10/3/22 12:26, Richie wrote:
My apologies if its not the right place to ask.
greetz
Korrupt
Every place is the right place for feedback, thx for yours !
I updated the readme [1] at the experimental branch and will merge it to
main soon. Feel free to give additional feedback -and/or- make
Hi, toralf,
since i'm quite a n00b regarding iptables and shellscripts: are there
somewhere n00b-proof setup instructions for the ddos protection scripts?
here: relay (schlafschaf) with the usual connection floods, running on
Kubuntu (latest LTS)
What i found out:
ipset is not installed per d
On 9/30/22 17:57, Sandro Auerbach wrote:
30 minutes later still 22000 connections...
Have you observed something similar?
I reduced those spikes [1] by using certain iptables rules [2].
[1] https://github.com/toralf/torutils/blob/main/sysstat.svg
[2] https://github.com/toralf/torutils
--
Tor
Hello,
After changing my server, the connections settled between 6000-8000
incoming connections in the first 2 weeks of the warm-up period.
(Guard/non exit)
Since it seems that many relays have been overloaded in the last few
weeks, I think a big DDOS is running again.
Yesterday I tried to r
10 matches
Mail list logo