Hello again,

indeed, the port 9050 is closed, but not filtered. I've set up a drop rule
in the VPS firewall( Parallels Plesk Panel) on this port, but it's not
working fine.

I am amazed by all the amount of this kind of traffic, more than 700
packets/second. According to Kent Backman, this is the clickfraud net
called "Rotpoi$on" (a lot of info at
https://b.kentbackman.com/2013/04/15/rotpoion-botnet-powered-by-thousands-of
-servers/)

Maybe I'll be able to block all these incoming connections, but I'm afraid
that overall relay performance will decrease drastically because all the
filtering work...


The relay--> Atlas: newTorThird :
https://atlas.torproject.org/#details/ACED456D102F634F8DB3CBE8BC9A96F2569EC33C


2013/11/5 Paritesh Boyeyoko <parity....@gmail.com>

>  @jj tor
>
>
>
> The fact that your relay is refusing connections says that the port isn't
> open, which is a good thing.
>
>
>
> I suspect that persons unknown have port scanned your VPS, realised that
> you have Tor running (on standard ports) and is speculatively using a bot
> to (hopefully) connect to the SOCKS interface.
>
>
>
> I would
>
>
>
> a) move the Tor relay to non-standard ports
>
> b) use iptables to drop all incoming connections apart from the (new) Tor
> ports and shell access.
>
>
>
> Best,
>
> --
>
> Parity
>
> parity....@gmail.com
>
> _______________________________________________
> tor-relays mailing list
> tor-relays@lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
>
>
_______________________________________________
tor-relays mailing list
tor-relays@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to