Hi Gus,

Would you please expand on that a bit please? Was it a single server, a
network of them, one provider or multiple of them, etc...?

I doubt this was the work of a single person simply because they were
bored. I'm assuming we should still keep a lookout for
them to simply rent a bunch of more servers and continue.

By the way, I just received two more abuse reports an hour ago regarding
scans that happened on Nov. 6 so this might hopefully be before the stop
of the attacks.

Thank you

Enkidu


On 11/7/2024 1:49 PM, gus wrote:
> Hello everyone,
>
> I'm writing to share that the origin of the spoofed packets has been
> identified and successfully shut down today, thanks to the assistance
> from Andrew Morris at GreyNoise and anonymous contributors.
>
> I want to give special thanks to the members of our community who have
> dedicated their time and efforts to track down the perpetrators of this
> attack. 
>
> Although this fake abuse incident had minimal impact on the network --
> temporarily taking only a few relays offline -- it has been a
> frustrating issue for many relay operators. However, I want to reassure
> everyone that this disruption had no effect on Tor users whatsoever.
>
> We're incredibly fortunate to have such a skilled and committed group of
> relay operators standing with Tor.
>
> Thank you all for your resilience, ongoing support and for making the
> Tor network possible by running relays.
>
> Gus
>
> _______________________________________________
> tor-relays mailing list -- tor-relays@lists.torproject.org
> To unsubscribe send an email to tor-relays-le...@lists.torproject.org
_______________________________________________
tor-relays mailing list -- tor-relays@lists.torproject.org
To unsubscribe send an email to tor-relays-le...@lists.torproject.org

Reply via email to