Our exit relays are down, we suspect some manner of remote attack. The hardware itself appears offline.
Due to our co-location’s key card access changes, we are not able to get in to perform resets. Working on regaining access to our colo. We’d have remote hands reset them, but we’d like to assess the state and any possible kernel logs.
Our bridge relays are unaffected, they are on different hardware. The attacker’s appear to have been targeting exit relays.
Since we do not log network data, we cannot perform investigations into the attacker.
all 40 of our exit relays are back online this evening. we visited the datacenter and found the servers completely frozen.
on a positive note, all three of our Epyc HPEs have been upgraded to 128GB of RAM!
we'll be bumping up each server's relay count to 30 soon (currently 20 each). one of them has been out of service for a while, we'll be getting it back up with relays too, for a total of 90 exit relays.
#tor #privacy #censorship #anonymity
#TorOperators #cybersecurity #infosec
@EmeraldOnion we experienced an attack on our exit relays in the past few days. Our hardware isn’t offline though. It was a large 40Gb/s flood that seemed to utilize the relays themselves.
@EmeraldOnion to be more clear, the malicious users were likely making requests that then returned large amounts of data. No proof either way though. Could have also been a reflection attack.
@EmeraldOnion See https://infosec.exchange/@rene_mobile/111946225077294620 which might be related.