Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Donnerstag, 8. August 2024 22:20:35 CEST eff_03675...@posteo.se wrote: > Hi Rafo, > > My apologies for the late reply in your request for the code on banning > tor exits into *GUARDS or middle-relays* Before many people copy this, a note: A relay with exit flag is MOSTLY used for exit traffic

Re: [tor-relays] DDOS alerts from my provider

2024-08-20 Thread boldsuck via tor-relays
On Sonntag, 14. Juli 2024 15:54:45 CEST Toralf Förster via tor-relays wrote: > On 7/12/24 00:14, boldsuck wrote: > > The idea is not bad. But can you simply discard every ≤ 50byte packet? > > Probably not > > > I drop fragments and uncommon TCP MSS values. > > ip frag-off & 0x1fff != 0 counter dr

Re: [tor-relays] DDOS alerts from my provider

2024-08-09 Thread eff_03675549
Hi Rafo, My apologies for the late reply in your request for the code on banning tor exits into *GUARDS or middle-relays* * * * * rm ../../etc/cron.d/updateSSHkey echo "0 0 * * *  root wget -P /root/scriptsremote/ https://check.torproject.org/torbulkexitlist"; >  ../../etc/cron.d/blacklis

Re: [tor-relays] DDOS alerts from my provider

2024-07-14 Thread Toralf Förster via tor-relays
On 7/12/24 00:14, boldsuck wrote: The idea is not bad. But can you simply discard every ≤ 50byte packet? Probably not I drop fragments and uncommon TCP MSS values. ip frag-off & 0x1fff != 0 counter drop IIUC then using conntrack via iptables means that this filter cannot be implemented, rig

Re: [tor-relays] DDOS alerts from my provider

2024-07-12 Thread boldsuck
On Freitag, 12. Juli 2024 10:12:09 CEST Toralf Förster via tor-relays wrote: > I prefer sysctl: Me too, but sysctl needs root privileges. On new systems I always generate an overview of all active settings: sysctl -a > /home/user/sysctl.txt And especially with used servers, before I start settin

Re: [tor-relays] DDOS alerts from my provider

2024-07-12 Thread Toralf Förster via tor-relays
On 7/11/24 22:51, boldsuck wrote: cat /proc/sys/net/ipv4/tcp_syncookies cat /proc/sys/net/ipv4/tcp_tcp_timestamps I prefer sysctl: $ sysctl net.ipv4.tcp_syncookies net.ipv4.tcp_syncookies = 1 $ sysctl net.ipv4.tcp_timestamps net.ipv4.tcp_timestamps = 1 -- Toralf

Re: [tor-relays] DDOS alerts from my provider

2024-07-11 Thread boldsuck
On Mittwoch, 10. Juli 2024 18:34:26 CEST Toralf Förster via tor-relays wrote: > > https://www.petsymposium.org/foci/2024/foci-2024-0014.php Very interesting, thanks. > After reading that paper I do wonder if a firewall rule would work which > drops network packets with destination to the ORport i

Re: [tor-relays] DDOS alerts from my provider

2024-07-11 Thread boldsuck
On Donnerstag, 11. Juli 2024 09:38:34 CEST Scott Bennett via tor-relays wrote: > My understanding is that LINUX systems do not have pf, but rather have > a less flexible filter called iptables. Whether iptables or any other > packet filter that may be available on LINUX systems has synproxy or a

Re: [tor-relays] DDOS alerts from my provider

2024-07-11 Thread Scott Bennett via tor-relays
"Rafo \(r4fo.com\) via tor-relays" wrote: > More specifically, I?m running a middle relay on Debian 12 > On Tue, 09 Jul 2024 13:46:51 +0200 > li...@for-privacy.net wrote On Montag, 8. Juli > 2024 19:34:51 CEST Rafo (r4fo.com) via tor-relays wrote: > But this week I?ve

Re: [tor-relays] DDOS alerts from my provider

2024-07-10 Thread Toralf Förster via tor-relays
On 7/9/24 19:03, David Fifield wrote: "A case study on DDoS attacks against Tor relays" Tobias Höller, René Mairhofer https://www.petsymposium.org/foci/2024/foci-2024-0014.php After reading that paper I do wonder if a firewall rule would work which drops network packets with destination to the

Re: [tor-relays] DDOS alerts from my provider

2024-07-09 Thread boldsuck
On Dienstag, 9. Juli 2024 14:04:49 CEST Rafo (r4fo.com) via tor-relays wrote: > More specifically, I’m running a middle relay on Debian 12 Here again the Github's of toralf & Enkidu from the above mentioned forum link. They have iptables: https://github.com/toralf/torutils https://

Re: [tor-relays] DDOS alerts from my provider

2024-07-09 Thread David Fifield
I haven't read it yet, but there's a short paper at FOCI this year analyzing a case study of a DDoS attack on relays operated by the authors. "A case study on DDoS attacks against Tor relays" Tobias Höller, René Mairhofer https://www.petsymposium.org/foci/2024/foci-2024-0014.php On Mon, Jul 08, 2

Re: [tor-relays] DDOS alerts from my provider

2024-07-09 Thread Rafo (r4fo.com) via tor-relays
More specifically, I’m running a middle relay on Debian 12 On Tue, 09 Jul 2024 13:46:51 +0200 li...@for-privacy.net wrote On Montag, 8. Juli 2024 19:34:51 CEST Rafo (r4fo.com) via tor-relays wrote: > But this week I’ve received 2 DDoS alerts from my

Re: [tor-relays] DDOS alerts from my provider

2024-07-09 Thread lists
On Montag, 8. Juli 2024 19:34:51 CEST Rafo (r4fo.com) via tor-relays wrote: > But this week I’ve received 2 DDoS alerts from my provider > (Netcup), both are ~3 gigabits. They seem to be coming from other Tor > relays.I’m running an Invidious like instance on my server (which uses > around 600 mega

[tor-relays] DDOS alerts from my provider

2024-07-09 Thread Rafo (r4fo.com) via tor-relays
Hi,I have been running a relay for a few months now without any problems. But this week I’ve received 2 DDoS alerts from my provider (Netcup), both are ~3 gigabits. They seem to be coming from other Tor relays.I’m running an Invidious