I have had no reports of abuse with my partial exit for a couple of years, then suddenly OVH kills the server
(Reinstalling is a pain and IPV6 not autoloaded and they and Ubuntu keep changing networking) Anyway
“Abnormal activity has been detected on your VPS vps585081.ovh.net.
As your VPS poses too greater threat to our infrastructure, we had no choice but to put it in FTP rescue mode. This mode enables you to access the data on your VPS. An email containing information on FTP rescue mode has been sent to you.
Actions can no longer be carried out on your VPS via your Manager/API. Only the following actions are possible:
- Reinstallation of your VPS.
Please do not hesitate to contact our technical support team so that this situation does not become critical.
You will find the logs brought up by our system below, which led to this alert.
- START OF ADDITIONAL INFORMATION -
Attack detail : 7Kpps/3Mbps
dateTime srcIp:srcPort dstIp:dstPort protocol flags bytes reason
2021.07.17 15:44:37 CEST 51.38.64.xxx:39859 192.124.249.xx:443 TCP SYN 60 ATTACK:TCP_SYN
2021.07.17 15:44:37 CEST 51.38.64.xxx:38510 67.222.30.xx:443 TCP SYN 60 ATTACK:TCP_SYN
2021.07.17 15:44:37 CEST 51.38.64.xxx :43014 67.222.30.xx:443 TCP SYN 60 ATTACK:TCP_SYN
When I fire it up how to mitigate against this? My new server with the original IPV4 address is under attack already but tor is not running yet
Gerry
Hi,
whenever my IP changes, my node stops relaying traffic, and after a few hours I
see in the logs
[notice] Heartbeat: It seems like we are not in the cached consensus.
In past versions I remember seeing in the logs something like "...your ip seems
to have changed...", followed by a new "...publishing server descriptor...", as
far as I remember.
Now I have to monitor my ip, and restart Tor whenever it changes. Wouldn't it be
nice to go back to the previous behaviour?
Bye, Marco
--
https://metrics.torproject.org/rs.html#details/A4E74410D83705EEFF24BC265DE2…
Hello dear people
I have an OBSF4 bridge to support the free internet. If I look at my bridge
via https://metrics.torproject.org/ then the bridge distribution mechanism
is set to HTTPS. But I would like to activate Moat. How does it work?
Thank you very much
Hi,
the following table shows how many relays in onionoo data have no as_name data.
Since a long time the underlying DB has not been updated and there is a plan to improve things
https://gitlab.torproject.org/tpo/metrics/relay-search/-/issues/40004
Now I'm wondering if this improvement made things worse?
+------------+----------+
| 2021-06-10 | 419 |
| 2021-06-11 | 422 |
| 2021-06-12 | 422 |
| 2021-06-13 | 424 |
| 2021-06-14 | 421 |
| 2021-06-15 | 422 |
| 2021-06-16 | 420 |
| 2021-06-17 | 414 |
| 2021-06-18 | 1748 |
kind regards,
nusenu
--
https://nusenu.github.io
Hi All!
A while back, I sent an email to the tor-relays-universities mailing list,
announcing that we (dotsrc.org) are attempting to run fast exit nodes on
the Danish national research network:
https://lists.torproject.org/pipermail/tor-relays-universities/2020-Decembe…
Since then, our ISP has told us that they still don't like the idea of
running an exit node on a Danish research network IP, so they'll register
an AS number and request separate IPv6 addresses to dotsrc.
As far as I know, it is still not possible to run IPv6 only exit nodes,
which is why we're currently looking for a Provider Independent (PI) IPv4
address space that we can announce.
IPv4 addresses have become a scarce resource, and are too expensive for
dotsrc.org to buy on the open market. If you happen to have an unused IPv4
block (or know someone who might) that you're willing to donate or let
dotsrc.org announce, please contact us at staff(a)dotsrc.org.
https://dotsrc.org/news/2021-07-06_searching_for_ipv4_address_space/
Best regards
Anders Trier Olesen
staff(a)dotsrc.org
Hi everyone. I think it’s a good idea to publish a list of rejected relay fingerprints and reason why they are rejected once a month. This should make Tor more transparent.