You could modify the tor init script to limit the memory usable by /usr/sbin/tor as described here:
http://jlebar.com/2011/6/15/Limiting_the_amount_of_RAM_a_program_can_use.html But I don’t know if this works on RaspPi platform and what happens when the tor process hits the memory limit. Regards, Torland On Saturday 31 August 2013 11:14:04 Gordon Morehouse wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > krishna e bera: > > On 13-08-29 10:35 PM, Gordon Morehouse wrote: > >> What on earth is causing so many circuit creation requests in > >> such a short timespan? > > > > One possibility, if i recall correctly, is that the Tor that comes > > with the PirateBrowser bundle is configured to build single hop > > circuits. > > > Make sure that these defaults are still set in your relay: > The DDOS - because that's what it obviously is - managed to kill my > Pi-based node last night, so I've finally restarted with all these > except RefuseUnknownExits 1, just because of your caveat. > > I had some of the statistics already enabled, so it's continuing to > collect those. > > Is there a way to give Tor a hard memory cap, so it won't chew up all > available RAM on the system? > > > AllowSingleHopExits 0 AllowSingleHopCircuits 0 > > > > You can also try RefuseUnknownExits 1 but maybe auto is better > > > > And these may help sketch the circuit storms: EntryStatistics 1 > > ExitPortStatistics 1 ConnDirectionStatistics 1 > > Best, > Gordon M. > > -----BEGIN PGP SIGNATURE----- > > iQEcBAEBCgAGBQJSIjJoAAoJED/jpRoe7/ujuicH/Au5NXr/q5MTYH54mPPuE/OJ > 9jOkT/M34O0+U9gqYH8ja2gzTFf3CdxESraS6A7A+r2DWUX9R6l+zia5YX/SYCUu > dWWNB843vXhcjNqhw01h05c70QgKStKrm6sLCjliVxhcovfMnkmMxLxk3EmQ3OzW > nOdHQT2QGV+xCXqYz7FS9OtCnRmjTjI3bb8PJ1xcL76IjPGlCKr5vt7cDO3Y7x80 > o0hnPJxMhYs0MhS5sNXfHIifDNT6LlCuZvIT0GLe3w9Gg15BUYKgn5bi1iNEtoSV > J/2DbxvmT23Tv6E2WnpxEoOu/yupbHAiDcYbwIT1ig4mePA/xCgjdm7mEdqrXpE= > =AiLg > -----END PGP SIGNATURE----- > _______________________________________________ > tor-relays mailing list > tor-relays@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays