It’s possible that the attack was filtered upstream, and since you’re
closer to the attacker, you might still be seeing those spoofed packets.
Also, if you’re noticing spoofed packets coming from your own network,
it could indicate a deeper issue. Have you checked if reverse path
filtering is enabled?
On 9/11/24 23:15, tor-opera...@urdn.com.ua wrote:
I can confirm that the attack has not stopped and that we continue to
monitor spoofed packets with Tor relay's IP addresses including the
addresses of relays that are at our network.
This continues to trigger the sending of reports from the same amateurs.
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org