Toralf Förster
Toralf Förster
Well, actually increased it to 170 in commit 3f308d339 two months ago.
So, let _ipv4-rules.sh_ and _ipv6-rules.sh_ skip every tor config file if it contains the string `ServerTransportListenAddr` ?
Can you please give config examples and mention the expected output?
Hhm, interesting. I never thought about preventing DDoS of a bridge (I used a reduced firewall for non-server relays: https://github.com/toralf/tor-relays/blob/main/playbooks/roles/setup_common/templates/firewall-ipv4.sh.j2) And because my bridges are configured like ``` BridgeRelay 1...
Does the commit above matches your needs?
> When running with: > > `sudo CONFIGURED_RELAYS="ServerIP :8080 ServerIP :8000" ./ipv4-rules.sh start ` BTW, The spaces before the colon are wrong (copy+paste error I do assume?)
So I need the torrc to understood what happened. Please replace the ServerIP with `1.2.3.4` when attaching the file here.
> /* DDoS IPv4 Mon, 17 Mar 2025 18:10:42 +0000 */ And I do not understood the rules above this one. Do you added additional code to the script?
Basically: ``` Log notice file /var/log/tor/notices.log RunAsDaemon 1 ControlPort 9051 HashedControlPassword 16:MyHashOfMyPassword ORPort 1.2.3.4:8080 AccountingMax 25 GB AccountingStart day 00:00 ContactInfo ExitPolicy reject *:* BridgeRelay 1 ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy...
fixed behaviour by 64e24ee91