What is the fingerprint of your exit node, maybe someone here can take a look?
Also, use iptables! If it is a dedicated VPS then drop anything you dont recognize, leaving only Tor ports (9001,9030 default) and maybe a service port like 22 for SSH for something. Port 9050 should not be visible from outside... Tom On 5 November 2013 08:36, jj tor <[email protected]> wrote: > Sorry for the confusión, the exact line in my torrc is "Socksport 0", so, > SOCKS port is closed. Moreover, I haven't got any exit rule towards port > 9050 > > Even if I block this traffic using iptables, I am very curious about why > the server is receiving that huge amount > > Maybe, because my relay's exit policy? (exit policy--> > doc/ReducedExitPolicy – Tor Bug Tracker & Wiki : > https://trac.torproject.org/projects/tor/wiki/doc/ReducedExitPolicy) > > > 2013/11/5 Paritesh Boyeyoko <[email protected]> > >> @jj tor >> >> >> >> ...and before I forget, yes deploy IPtables anyway. :) >> >> >> >> Best, >> >> -- >> >> Parity >> >> [email protected] >> >> _______________________________________________ >> tor-relays mailing list >> [email protected] >> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays >> >> > > _______________________________________________ > tor-relays mailing list > [email protected] > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays > >
_______________________________________________ tor-relays mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
