On 2013-08-30 20:39, Yoriz wrote: [..]
Aug 29 23:19:59.000 [warn] Received http status code 504 ("Gateway Time-out") from server '154.x.x.x:80' while fetching "/tor/server/d/54BDF368367470FCBF015...067.z". I'll try again soon. Aug 30 00:14:52.000 [warn] http status 504 ("Gateway Time-out") reason unexpected while uploading descriptor to server '154.x.x.x:80').
That likely is the following ticket:
https://trac.torproject.org/projects/tor/ticket/8458
Greets, Jeroen
I'm seeing the same on all 5 of my non-exit nodes, they are spread around the US and EU. It seems that they all are running at close to max bandwith for the last several days also.
On Sat, Aug 31, 2013 at 1:14 PM, Jeroen Massar jeroen@unfix.org wrote:
On 2013-08-30 20:39, Yoriz wrote: [..]
Aug 29 23:19:59.000 [warn] Received http status code 504 ("Gateway Time-out") from server '154.x.x.x:80' while fetching "/tor/server/d/54BDF368367470FCBF015...067.z". I'll try again soon. Aug 30 00:14:52.000 [warn] http status 504 ("Gateway Time-out") reason unexpected while uploading descriptor to server '154.x.x.x:80').
That likely is the following ticket:
https://trac.torproject.org/projects/tor/ticket/8458
Greets, Jeroen
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Richard Budd:
I'm seeing the same on all 5 of my non-exit nodes, they are spread around the US and EU. It seems that they all are running at close to max bandwith for the last several days also.
My guess is whoever is running the DDOS[1] figured out that they can most cheaply disrupt the Tor network by creating bogus circuits (and eventually causing relays to run out of RAM and/or CPU) rather than sending reams of bogus data through.
Whether that's true or not, my experiments with Raspberry Pi relays provide sort of a 'canary in the coal mine' - enough circuits and tor *will* consume all available RAM and be killed, as happened finally to me sometime in the wee hours here.
[1] I presume it's a DDOS because a) come on; b) look at the graph of clients connecting from Vietnam. ~0 to ~5000 in a week or two? Yeah right.
Best, - -Gordon M.
I've been following your Pi thread, and up until yesterday I've haven't seen any problems at all on mine. Of course it's only running 2 meg bandwidth total. So I thought that might be the difference. Then last night my router (Asus Asus RT-N66U running Shibby Tomato) became very sluggish. Log showed pages of "Tomato user.warn kernel: nf_conntrack: table full, dropping packet" So I increased Max Connections and Hash Table sizes by about 50% and that has seemed to relieve the router problems. Top shows Tor using 60 to 80% CPU. But it's not doing anything else so I'll let it run till it gives up. (it's been running for over 70 days)
On Sat, Aug 31, 2013 at 2:20 PM, Gordon Morehouse gordon@morehouse.mewrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Richard Budd:
I'm seeing the same on all 5 of my non-exit nodes, they are spread around the US and EU. It seems that they all are running at close to max bandwith for the last several days also.
My guess is whoever is running the DDOS[1] figured out that they can most cheaply disrupt the Tor network by creating bogus circuits (and eventually causing relays to run out of RAM and/or CPU) rather than sending reams of bogus data through.
Whether that's true or not, my experiments with Raspberry Pi relays provide sort of a 'canary in the coal mine' - enough circuits and tor *will* consume all available RAM and be killed, as happened finally to me sometime in the wee hours here.
[1] I presume it's a DDOS because a) come on; b) look at the graph of clients connecting from Vietnam. ~0 to ~5000 in a week or two? Yeah right.
Best,
- -Gordon M.
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJSIjPeAAoJED/jpRoe7/ujuUsIAKRCXz51z+/5MRywfYA48ySi 4325YqSdjzl8mhDKmpOOohhUTMTkCPJvDsD4BC8JyoaEk4cDDdsKMOwPUx2szvAr Vhkh7rwMqYuDR/nkH+E2w9CVPFgo8BeVbuRSuewX/vvVE4nAS1m4ULB3ffA3EYko dC9kFN9vf1uFb8lMGu6rVAULm6f8kzWYMGZ0uaWat6qQ4x45kWLxt8Y3caHESk3U 2tpLLAOLT7nhqGC1ALNOEm3gmox1xRFQM1vaYUdpIGb4hhkRKtHEXj+J00Mp0sPH f4QQhPv+nUbEKamJD45MItU34Iv6zjTJVx9TP5ZkZ1qpa835YsknXaSXpjUe0Yg= =UjmG -----END PGP SIGNATURE----- _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Richard Budd:
I've been following your Pi thread, and up until yesterday I've haven't seen any problems at all on mine. Of course it's only running 2 meg bandwidth total. So I thought that might be the difference.
Yes, I have 3Mbps outbound and I currently let the Pi burst up to about 80% of that or so, though it rarely sees that much traffic for long. It's still pretty variable, especially when I lose my Stable flag. :(
Then last night my router (Asus Asus RT-N66U running Shibby Tomato) became very sluggish. Log showed pages of "Tomato user.warn kernel: nf_conntrack: table full, dropping packet" So I increased Max Connections and Hash Table sizes by about 50% and that has seemed to relieve the router problems.
This is a common problem with Tor and Bittorrent and especially the combination of both. Just be aware, many router firmwares aren't too smart and will let you increase the size of your conntrack tables past the point where the router will run out of RAM and start killing processes, thus necessitating a reboot. This includes whatever version of Tomato I'm running.
Top shows Tor using 60 to 80% CPU. But it's not doing anything else so I'll let it run till it gives up. (it's been running for over 70 days)
Maybe you could enable the statistics keeping that krishna e bara suggested[1]? I haven't peeked at them yet to see what they look like, but they might prove valuable to figuring out the Pi's limits.
In my extremely constrained free time I am working on purchasing a small flotilla of Pis to deploy at various friends' houses and use as a testbed for my "plug-and-forget Tor relay on a Pi that doesn't mess with your video streaming, games or torrents" project[2]. So, I'll have to eventually look at those files since they'll be useful to *me*. :)
[1] https://lists.torproject.org/pipermail/tor-relays/2013-August/002590.html
[2] https://github.com/gordon-morehouse/cipollini
tor-relays@lists.torproject.org