[tor-relays] Short heads up
Georg Koppen
gk at torproject.org
Mon Jan 9 18:27:27 UTC 2023
Neel Chauhan:
> On 2022-12-25 00:27, Frank Steinborn via tor-relays wrote:
>> Hi friends,
>>
>> I made some smaller tweaks over the last few hours which should
>> especially help relays on nearly OOM or thrashing situations (making
>> use of Zswap + MGLRU if available).
>>
>> The rules themselves are just the same, so no changes there.
>
> I had an exit relay which was constantly DDoSed. Instance CPU usage was
> 40%.
>
> Had the IP change (for another reason tho) and it didn't go away, the
> DDoS targeted that particular fingerprint. That server had two relays,
> one fortunately unaffected.
>
> I ended up just changing the fingerprint for the affected one. Now I
> have to wait for the ramp-up phase, yay!
Interesting. What was the old fingerprint? Did the affected and
unaffected relays were guards and/or exists?
Georg
>> Merry christmas,
>> Frank
>
> Best,
>
> Neel
>
>>
>>
>>
>>
>> ------- Original Message -------
>> On Sunday, December 4th, 2022 at 11:25 PM, Frank Steinborn
>> <steinex at nognu.de> wrote:
>>
>>
>>>
>>>
>>> Hi,
>>>
>>> I want to show you my anti DDoS solution for my relays (aswell ;-).
>>> It works without ipset, but with a mix of the recent and hashlimit
>>> iptables modules.
>>>
>>> What is does:
>>> * If one IP address tries to make 7 SYN connection attempts per
>>> second, they are locked out for 300 seconds. If they try another
>>> connection in that timeframe, the timer is reset and they are locked
>>> out for another 300 seconds.
>>> * Threre are no more SYNs allowed if 4 connections are already in use
>>> to the ORPort.
>>>
>>> It works very well for me. Other solutons are far more aggressive but
>>> I feel my solution works perfectly against the attacks, even if they
>>> are not that aggresive.
>>>
>>> On top of that, I feel its more easy to implement into ones existing
>>> firewall solution.
>>>
>>> You can find the repo here: https://github.com/steinex/tor-ddos
>>>
>>> Feel free to give it a shot and feedback would be much appreciated!
>>>
>>> Greetings,
>>> steinex
>> _______________________________________________
>> tor-relays mailing list
>> tor-relays at lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20230109/24cfc38c/attachment.sig>
More information about the tor-relays
mailing list