-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Richard Budd: > I'm seeing the same on all 5 of my non-exit nodes, they are spread > around the US and EU. It seems that they all are running at close > to max bandwith for the last several days also.
My guess is whoever is running the DDOS[1] figured out that they can most cheaply disrupt the Tor network by creating bogus circuits (and eventually causing relays to run out of RAM and/or CPU) rather than sending reams of bogus data through. Whether that's true or not, my experiments with Raspberry Pi relays provide sort of a 'canary in the coal mine' - enough circuits and tor *will* consume all available RAM and be killed, as happened finally to me sometime in the wee hours here. [1] I presume it's a DDOS because a) come on; b) look at the graph of clients connecting from Vietnam. ~0 to ~5000 in a week or two? Yeah right. Best, - -Gordon M. -----BEGIN PGP SIGNATURE----- iQEcBAEBCgAGBQJSIjPeAAoJED/jpRoe7/ujuUsIAKRCXz51z+/5MRywfYA48ySi 4325YqSdjzl8mhDKmpOOohhUTMTkCPJvDsD4BC8JyoaEk4cDDdsKMOwPUx2szvAr Vhkh7rwMqYuDR/nkH+E2w9CVPFgo8BeVbuRSuewX/vvVE4nAS1m4ULB3ffA3EYko dC9kFN9vf1uFb8lMGu6rVAULm6f8kzWYMGZ0uaWat6qQ4x45kWLxt8Y3caHESk3U 2tpLLAOLT7nhqGC1ALNOEm3gmox1xRFQM1vaYUdpIGb4hhkRKtHEXj+J00Mp0sPH f4QQhPv+nUbEKamJD45MItU34Iv6zjTJVx9TP5ZkZ1qpa835YsknXaSXpjUe0Yg= =UjmG -----END PGP SIGNATURE----- _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays