Hello All,
I commented and questioned earlier about significant slowing of one of my 
Finnish exit relays [1] and potential DoS attack.  I took the server off line 
and did the best job I could hardening it.  The host does not have DoS 
protection and uses Xen OpenVZ as his VPS manager.  I was getting "nf_contract: 
table full, dropping packet." errors by the 1000s.  That's fixed and I'm back 
on the Tor net now.
One question remains:  At any time I look there are 20-150 Iranian IP addresses 
trying to access the Tor server.  Their IP range is from 5.113.x.x to 
5.126.x.x.  None have hashed fingerprints.  Is it okay to let these guys go?  
Can they harm or slow Tor?  Should I ban them?  I'd like to learn from this.
-potlatch

Sent with [ProtonMail](https://protonmail.com) Secure Email.
_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to